CVE-2024-39719: n/a
An issue was discovered in Ollama through 0.3.14. File existence disclosure can occur via api/create. When calling the CreateModel route with a path parameter that does not exist, it reflects the "File does not exist" error message to the attacker, providing a primitive for file existence on the server.
AI Analysis
Technical Summary
CVE-2024-39719 is a vulnerability identified in the Ollama software up to version 0.3.14, involving file existence disclosure through the api/create endpoint. Specifically, when an attacker calls the CreateModel route with a path parameter referencing a file or resource that does not exist on the server, the application responds with an explicit error message stating "File does not exist." This behavior constitutes an information disclosure vulnerability categorized under CWE-209 (Information Exposure Through an Error Message). The vulnerability is exploitable remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS base score is 7.5, reflecting high severity primarily due to the confidentiality impact (C:H), while integrity and availability are unaffected. The disclosed information can be leveraged by attackers to perform reconnaissance, identify valid files or directories, and potentially map the server's file system structure. This reconnaissance can facilitate more targeted attacks such as privilege escalation, code injection, or exploitation of other vulnerabilities. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability affects all deployments of Ollama up to version 0.3.14, which is a software product used for AI model management or related purposes. The issue arises from insufficient error handling and overly informative error messages returned by the API endpoint.
Potential Impact
The primary impact of CVE-2024-39719 is the disclosure of sensitive information about the server's file system through error messages. This can aid attackers in mapping the server environment, identifying existing files, and planning further attacks. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach can be a stepping stone for more severe exploits, especially in complex environments where file paths may reveal configuration files, credentials, or other sensitive resources. Organizations using Ollama in exposed environments risk targeted attacks that leverage this reconnaissance. The lack of authentication requirements and the ability to exploit remotely increase the risk profile. However, since no direct code execution or data modification is possible solely through this vulnerability, the immediate damage is limited to information disclosure. The absence of known exploits in the wild reduces the current threat level but does not eliminate future risk. Overall, the vulnerability can facilitate lateral movement, privilege escalation, or exploitation of chained vulnerabilities in affected systems.
Mitigation Recommendations
To mitigate CVE-2024-39719, organizations should implement the following specific measures: 1) Restrict access to the api/create endpoint by implementing network-level controls such as IP whitelisting, VPN access, or firewall rules to limit exposure to trusted users only. 2) Employ web application firewalls (WAFs) configured to detect and block requests with suspicious path parameters or error message patterns indicative of probing attempts. 3) Monitor application logs for repeated or anomalous requests to the CreateModel route that may indicate reconnaissance activity. 4) Implement custom error handling in Ollama to avoid disclosing detailed error messages; replace explicit "File does not exist" responses with generic error messages that do not reveal file existence. 5) Stay updated with Ollama vendor advisories and apply patches promptly once available. 6) Conduct regular security assessments and penetration testing to identify similar information disclosure issues. 7) Consider deploying runtime application self-protection (RASP) solutions to detect and mitigate exploitation attempts in real time. These targeted actions go beyond generic advice by focusing on access control, error message management, and proactive detection tailored to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2024-39719: n/a
Description
An issue was discovered in Ollama through 0.3.14. File existence disclosure can occur via api/create. When calling the CreateModel route with a path parameter that does not exist, it reflects the "File does not exist" error message to the attacker, providing a primitive for file existence on the server.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-39719 is a vulnerability identified in the Ollama software up to version 0.3.14, involving file existence disclosure through the api/create endpoint. Specifically, when an attacker calls the CreateModel route with a path parameter referencing a file or resource that does not exist on the server, the application responds with an explicit error message stating "File does not exist." This behavior constitutes an information disclosure vulnerability categorized under CWE-209 (Information Exposure Through an Error Message). The vulnerability is exploitable remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS base score is 7.5, reflecting high severity primarily due to the confidentiality impact (C:H), while integrity and availability are unaffected. The disclosed information can be leveraged by attackers to perform reconnaissance, identify valid files or directories, and potentially map the server's file system structure. This reconnaissance can facilitate more targeted attacks such as privilege escalation, code injection, or exploitation of other vulnerabilities. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability affects all deployments of Ollama up to version 0.3.14, which is a software product used for AI model management or related purposes. The issue arises from insufficient error handling and overly informative error messages returned by the API endpoint.
Potential Impact
The primary impact of CVE-2024-39719 is the disclosure of sensitive information about the server's file system through error messages. This can aid attackers in mapping the server environment, identifying existing files, and planning further attacks. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach can be a stepping stone for more severe exploits, especially in complex environments where file paths may reveal configuration files, credentials, or other sensitive resources. Organizations using Ollama in exposed environments risk targeted attacks that leverage this reconnaissance. The lack of authentication requirements and the ability to exploit remotely increase the risk profile. However, since no direct code execution or data modification is possible solely through this vulnerability, the immediate damage is limited to information disclosure. The absence of known exploits in the wild reduces the current threat level but does not eliminate future risk. Overall, the vulnerability can facilitate lateral movement, privilege escalation, or exploitation of chained vulnerabilities in affected systems.
Mitigation Recommendations
To mitigate CVE-2024-39719, organizations should implement the following specific measures: 1) Restrict access to the api/create endpoint by implementing network-level controls such as IP whitelisting, VPN access, or firewall rules to limit exposure to trusted users only. 2) Employ web application firewalls (WAFs) configured to detect and block requests with suspicious path parameters or error message patterns indicative of probing attempts. 3) Monitor application logs for repeated or anomalous requests to the CreateModel route that may indicate reconnaissance activity. 4) Implement custom error handling in Ollama to avoid disclosing detailed error messages; replace explicit "File does not exist" responses with generic error messages that do not reveal file existence. 5) Stay updated with Ollama vendor advisories and apply patches promptly once available. 6) Conduct regular security assessments and penetration testing to identify similar information disclosure issues. 7) Consider deploying runtime application self-protection (RASP) solutions to detect and mitigate exploitation attempts in real time. These targeted actions go beyond generic advice by focusing on access control, error message management, and proactive detection tailored to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c87b7ef31ef0b565efc
Added to database: 2/25/2026, 9:41:27 PM
Last enriched: 2/28/2026, 4:24:15 AM
Last updated: 4/12/2026, 3:44:59 PM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.