Description
mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a 'tarslip' attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/752d2376-2d9a-4e17-b462-3c267f9dd229
Scores
CVSS v3
9.8
EPSS
0.0049
EPSS Percentile
65.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-59
Status
published
Products (1)
mudler/localai
2.17.1
Published
Oct 29, 2024
Tracked Since
Feb 18, 2026