Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2024-37032 PoC — Ollama 安全漏洞

Source
Associated Vulnerability
Title:Ollama 安全漏洞 (CVE-2024-37032)
Description:Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Description
Path traversal in Ollama with rogue registry server
Readme
# CVE-2024-37032
Path traversal in Ollama with rogue registry server

- Learn from [Probllama: Ollama Remote Code Execution Vulnerability (CVE-2024-37032) – Overview and Mitigations](https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032#the-vulnerability-arbitrary-file-write-via-path-traversal-25)

# Vulnerability environment

```bash
docker run -d -v ollama:/root/.ollama -p 11434:11434 --name ollama ollama/ollama:0.1.33
```

# Rogue registry server

- Please modify `HOST` to your host **MUST WITHOUT PORT**
- Run with `python3 server.py`

# Run poc

- Please modify `HOST` to your rogue registry server host, and `target_url` to vulnerability host
- Run `python3 poc.py` and check rogue registry server log

![](screenshot.png)
File Snapshot

[4.0K] /data/pocs/18a99aa0c4517e73a4676af16b596e6d0cb4d78f ├── [1.0K] LICENSE ├── [ 372] poc.py ├── [ 751] README.md ├── [ 48] requirements.txt ├── [4.0K] rogue_registry_server │   └── [5.2K] server.py └── [335K] screenshot.png 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →