🚨High Risk Vulnerability Alert! 🚨: CVE-2024-3435 A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities. CVSSv3.1 Base Score: 8.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #lollms #parisneo #apisecurity #owasp https://lnkd.in/drxXWheK
API ThreatStats’ Post
More Relevant Posts
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34275 D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20553. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dT_bs-7k
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34279 D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20558. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dhqGc_jx
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34280 D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20559. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dffhqv94
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34276 D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20554. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dR_cfNez
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34281 D-Link DIR-2150 GetFirmwareStatus Target Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20561. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dVu6imyi
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34278 D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20556. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dh3gi2XZ
To view or add a comment, sign in
-
⚠️Medium Risk Vulnerability Alert⚠️: CVE-2023-34277 D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20555. CVSSv3.1 Base Score: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) #dlink #apisecurity #owasp https://lnkd.in/dtF2Z38C
To view or add a comment, sign in
-
https://lnkd.in/gnjYgnrs CVSSv3 Score 9.6 Impact Execute unauthorized code or commands CVE ID CVE-2024-21762 We recommend conducting immediate verification of the upgrade.
To view or add a comment, sign in
-
Start patching to close any gaps.
❗ ALERT ❗ A critical vulnerability (CVE-2023-48788) is affecting Fortinet’s FortiClientEMS, including: - FortiClientEMS 7.2 to 7.2.2. - FortiClientEMS 7.0 to 7.0.10 This vulnerability can result in remote code execution by an unauthenticated threat actor to execute unauthorised code or commands via specifically crafted request. Organisations should implement available patches immediately. Read the full alert at https://lnkd.in/gttKDy2A
To view or add a comment, sign in
-
-
❗ ALERT ❗ A critical vulnerability (CVE-2023-48788) is affecting Fortinet’s FortiClientEMS, including: - FortiClientEMS 7.2 to 7.2.2. - FortiClientEMS 7.0 to 7.0.10 This vulnerability can result in remote code execution by an unauthenticated threat actor to execute unauthorised code or commands via specifically crafted request. Organisations should implement available patches immediately. Read the full alert at https://lnkd.in/gttKDy2A
To view or add a comment, sign in
-