text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_prompt() allows reading any .txt file on the server filesystem. The file content is returned verbatim in the API response.
This vulnerability is fixed in 4.3.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 1
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Oobabooga Text_Generation_Web_Ui
cpe:2.3:a:oobabooga:text_generation_web_ui:*:*:*:*:*:*:*:*
|
— |
4.3
|