{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5182","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","state":"PUBLISHED","assignerShortName":"@huntr_ai","dateReserved":"2024-05-21T18:08:53.150Z","datePublished":"2024-06-19T23:30:38.219Z","dateUpdated":"2024-08-01T21:03:10.990Z"},"containers":{"cna":{"title":"Path Traversal in mudler/localai","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntr_ai","dateUpdated":"2024-06-19T23:30:38.219Z"},"descriptions":[{"lang":"en","value":"A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter."}],"affected":[{"vendor":"mudler","product":"mudler/localai","versions":[{"version":"unspecified","lessThan":"2.16.0","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://huntr.com/bounties/f7a87f29-c22a-48e8-9fce-b6d5a273e545"},{"url":"https://github.com/mudler/localai/commit/1a3dedece06cab1acc3332055d285ac540a47f0e"}],"metrics":[{"cvssV3_0":{"version":"3.0","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","cweId":"CWE-22"}]}],"source":{"advisory":"f7a87f29-c22a-48e8-9fce-b6d5a273e545","discovery":"EXTERNAL"}},"adp":[{"affected":[{"vendor":"mudler","product":"localai","cpes":["cpe:2.3:a:mudler:localai:0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"2.16.0","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-20T16:14:16.413630Z","id":"CVE-2024-5182","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-20T16:15:08.227Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:03:10.990Z"},"title":"CVE Program Container","references":[{"url":"https://huntr.com/bounties/f7a87f29-c22a-48e8-9fce-b6d5a273e545","tags":["x_transferred"]},{"url":"https://github.com/mudler/localai/commit/1a3dedece06cab1acc3332055d285ac540a47f0e","tags":["x_transferred"]}]}]}}