VYPR
Moderate severityNVD Advisory· Published Jun 24, 2024· Updated Aug 1, 2024

Remote Code Execution in create_conda_env function in parisneo/lollms

CVE-2024-3121

Description

A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A remote code execution vulnerability in lollms v5.9.0 allows command injection via shell=True in subprocess.Popen.

Vulnerability

Description The vulnerability resides in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The function uses subprocess.Popen with shell=True, which enables shell command injection. An attacker can inject arbitrary commands through the env_name and python_version parameters, leading to remote code execution [1].

Exploitation

Conditions No authentication is required if the function is exposed via an API. The attacker needs to control the input values for env_name or python_version, which are typically provided by the user. The exploit can be triggered by sending crafted HTTP requests to the service endpoint that calls create_conda_env [1].

Impact

Successful exploitation allows an attacker to execute arbitrary OS commands on the server. This could lead to data exfiltration, lateral movement, or complete compromise of the affected system. The example given demonstrates execution of the 'whoami' command, proving code execution capability [1].

Mitigation

Status As of the publication date, version 5.9.0 is affected. The issue was reported via the Huntr bug bounty platform [3]. Users should update to a patched version if available, or avoid exposing the vulnerable function to untrusted input. No official patch has been confirmed at this time.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
lollmsPyPI
<= 9.5.1

Affected products

2
  • ghsa-coords
    Range: <= 9.5.1
  • parisneo/parisneo/lollmsv5
    Range: unspecified

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.