CVE-2024-37032
HIGH EXPLOITED NUCLEIOllama < 0.1.34 - Path Traversal
Title source: ruleDescription
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Exploits (4)
nomisec
WORKING POC
8 stars
by pankass · poc
https://github.com/pankass/CVE-2024-37032_CVE-2024-45436
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ollama_rce_cve_2024_37032.rb
Nuclei Templates (1)
Ollama - Remote Code Execution
CRITICALVERIFIEDby kaks3c
Shodan:
ollama
References (4)
Scores
CVSS v3
8.8
EPSS
0.9362
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-08-22
CWE
CWE-22
Status
published
Products (2)
ollama/ollama
< 0.1.34
ollama/ollama
0 - 0.1.34Go
Published
May 31, 2024
Tracked Since
Feb 18, 2026