CVE-2024-6581: Lollms vulnerable to Cross-site Scripting
(updated )
A vulnerability in the discussion image upload function of the Lollms application, version v9.9, allows for the uploading of SVG files. Due to incomplete filtering in the sanitize_svg function, this can lead to cross-site scripting (XSS) vulnerabilities, which in turn pose a risk of remote code execution. The sanitize_svg function only removes script elements and ‘on*’ event attributes, but does not account for other potential vectors for XSS within SVG files. This vulnerability can be exploited when authorized users access a malicious URL containing the crafted SVG file.
References
- github.com/advisories/GHSA-cm59-8rmv-f2cj
- github.com/parisneo/lollms
- github.com/parisneo/lollms/commit/328b960a0de2097e13654ac752253e9541521ddd
- github.com/pypa/advisory-database/tree/main/vulns/lollms/PYSEC-2024-116.yaml
- huntr.com/bounties/ad68ecd6-44e2-449b-8e7e-f2b71b1b43c7
- nvd.nist.gov/vuln/detail/CVE-2024-6581
Detect and mitigate CVE-2024-6581 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →