logo

CVE-2024-5182 github.com/go-skynet/localai

Package

Manager: go
Name: github.com/go-skynet/localai
Vulnerable Version: >=0 <2.16.0

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00502 pctl0.65002

Details

LocalAI path traversal vulnerability A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter.

Metadata

Created: 2024-06-20T00:30:46Z
Modified: 2024-07-08T21:18:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-cpcx-r2gq-x893/GHSA-cpcx-r2gq-x893.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-cpcx-r2gq-x893
Finding: F063
Auto approve: 1