← Retour aux CVEs
CVE-2024-6868
CRITICAL9.8
Description
mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a 'tarslip' attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie10/29/2024
Derniere modification10/15/2025
Sourcenvd
Observations honeypot0
Produits affectes
mudler:localai
Faiblesses (CWE)
CWE-59
References
https://github.com/mudler/localai/commit/a181dd0ebc5d3092fc50f61674d552604fe8ef9c(security@huntr.dev)
https://huntr.com/bounties/752d2376-2d9a-4e17-b462-3c267f9dd229(security@huntr.dev)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.