CVE-2024-41950 – haystack-ai
Package
Manager: pip
Name: haystack-ai
Vulnerable Version: >=0 <2.3.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0116 pctl0.77787
Details
Insecure Jinja2 templates rendered in Haystack Components can lead to RCE ### Impact Haystack clients that let their users create and run Pipelines from scratch are vulnerable to remote code executions. Certain Components in Haystack use Jinja2 templates, if anyone can create and render that template on the client machine they run any code. ### Patches The problem has been fixed with PRs deepset-ai/haystack#8095 and deepset-ai/haystack#8096. Both have been released with Haystack `2.3.1`. ### Workarounds Prevent users from running the affected Components, or only let users use preselected templates. ### References The list of impacted Components can be found in the release notes for `2.3.1`. https://github.com/deepset-ai/haystack/releases/tag/v2.3.1
Metadata
Created: 2024-07-31T18:50:41Z
Modified: 2024-07-31T18:50:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-hx9v-6r9f-w677/GHSA-hx9v-6r9f-w677.json
CWE IDs: ["CWE-1336"]
Alternative ID: GHSA-hx9v-6r9f-w677
Finding: F422
Auto approve: 1