<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Open WebUI (Formerly Ollama WebUI) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/open-webui-formerly-ollama-webui/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jul 2024 18:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/open-webui-formerly-ollama-webui/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open WebUI Arbitrary File Upload and Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-07-open-webui-upload-traversal/</link><pubDate>Wed, 03 Jul 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-open-webui-upload-traversal/</guid><description>Open WebUI version 0.1.105 is vulnerable to arbitrary file upload and path traversal, allowing attackers to upload files to arbitrary locations on the web server's filesystem by exploiting a lack of filename validation.</description><content:encoded><![CDATA[<p>Open WebUI version 0.1.105, formerly known as Ollama WebUI, is susceptible to an arbitrary file upload and path traversal vulnerability. Discovered by Jaggar Henry &amp; Sean Segreti of KoreLogic, Inc. in March 2024, this flaw allows an attacker to upload files to arbitrary locations on the web server&rsquo;s filesystem. The vulnerability stems from the application&rsquo;s failure to properly validate or sanitize filenames during file uploads to the <code>/rag/api/v1/doc</code> endpoint. By exploiting this, malicious actors can use dot-segments (e.g., <code>../../</code>) in the file path to traverse out of the intended uploads directory. Successful exploitation enables the uploading of malicious models, such as pickled Python objects, or the modification of system files like <code>authorized_keys</code> for SSH access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Open WebUI web interface.</li>
<li>The attacker crafts an HTTP POST request to the <code>/rag/api/v1/doc</code> endpoint, initiating a file upload.</li>
<li>The attacker includes a malicious filename in the multipart form data, containing path traversal sequences (e.g., <code>../../../../../../../../../../tmp/pwned.txt</code>).</li>
<li>The Open WebUI server receives the request and extracts the unsanitized filename from the HTTP POST request.</li>
<li>The server constructs a file path using the provided filename and the static <code>UPLOAD_DIR</code> variable.</li>
<li>The server proceeds to write the contents of the uploaded file to the constructed file path, effectively bypassing intended directory restrictions.</li>
<li>A malicious actor can overwrite existing system files, such as <code>.ssh/authorized_keys</code> for unauthorized system access.</li>
<li>Alternatively, an attacker uploads a malicious model as a pickled python object to achieve remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability, identified as CVE-2026-44566, can lead to arbitrary code execution on the server. An attacker could gain unauthorized access to the system, potentially leading to data breaches, system compromise, or denial of service. The vulnerable version, 0.1.105, is actively exploitable, and organizations using this version are at risk. The targeted platform observed during analysis was Debian GNU/Linux 12.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Open WebUI to a version beyond 0.1.123 which addresses the CVE-2026-44566 vulnerability.</li>
<li>Implement input validation and sanitization on the server-side to prevent path traversal attacks during file uploads to mitigate the arbitrary file upload.</li>
<li>Deploy the Sigma rule &ldquo;Detect Open WebUI Path Traversal File Upload&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for HTTP POST requests to the <code>/rag/api/v1/doc</code> endpoint with filenames containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-upload</category><category>web-application</category></item></channel></rss>