Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39722: n/a

0
High
VulnerabilityCVE-2024-39722cvecve-2024-39722
Published: Thu Oct 31 2024 (10/31/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Ollama before 0.1.46. It exposes which files exist on the server on which it is deployed via path traversal in the api/push route.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:25:00 UTC

Technical Analysis

CVE-2024-39722 is a path traversal vulnerability identified in Ollama software versions before 0.1.46. The flaw exists in the api/push route, where insufficient validation of file path inputs allows attackers to traverse directories and determine the existence of arbitrary files on the server hosting Ollama. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The vulnerability can be exploited remotely without any authentication or user interaction, making it accessible to any attacker with network access to the affected service. The CVSS 3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the confidentiality impact. While the vulnerability does not allow modification or deletion of files (integrity unaffected) nor does it cause denial of service (availability unaffected), the ability to enumerate files can reveal sensitive configuration files, credentials, or other critical information that could be leveraged in subsequent attacks. No patches or fixes are explicitly linked yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in June 2024 and published in October 2024, indicating recent discovery. Ollama is a platform related to AI model deployment and management, so the exposure of internal files could compromise operational security or intellectual property.

Potential Impact

The primary impact of CVE-2024-39722 is unauthorized information disclosure. Attackers can remotely enumerate files on the server, potentially exposing sensitive data such as configuration files, API keys, credentials, or proprietary model data. This information leakage can facilitate further targeted attacks, including privilege escalation, lateral movement, or exploitation of other vulnerabilities. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can undermine trust and security posture. Organizations deploying Ollama in production environments, especially those handling sensitive AI models or data, face increased risk of intellectual property theft or operational disruption through chained attacks. The lack of authentication and user interaction requirements broadens the attack surface, making any exposed Ollama instance vulnerable to reconnaissance by external threat actors. The absence of known exploits in the wild suggests limited active exploitation currently, but the high CVSS score and ease of exploitation warrant urgent mitigation to prevent future attacks.

Mitigation Recommendations

1. Upgrade Ollama to version 0.1.46 or later as soon as the patch is available to eliminate the path traversal vulnerability. 2. Until an official patch is released, implement strict input validation and sanitization on the api/push route to reject any path traversal sequences such as '../' or absolute paths. 3. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the api/push endpoint. 4. Restrict network access to the Ollama service to trusted internal networks or VPNs, minimizing exposure to external attackers. 5. Conduct regular security audits and penetration testing focusing on file path handling and API endpoints. 6. Monitor logs for unusual requests containing suspicious path traversal patterns to detect potential exploitation attempts early. 7. Implement least privilege file system permissions for the Ollama server process to limit file visibility and access even if traversal occurs. 8. Educate development and operations teams about secure coding practices related to file path handling to prevent similar vulnerabilities in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c87b7ef31ef0b565f08

Added to database: 2/25/2026, 9:41:27 PM

Last enriched: 2/28/2026, 4:25:00 AM

Last updated: 4/12/2026, 3:45:52 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses