CVE-2024-3098 – llama-index-core
Package
Manager: pip
Name: llama-index-core
Vulnerable Version: >=0 <0.10.24
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00146 pctl0.35646
Details
llama-index-core Prompt Injection vulnerability leading to Arbitrary Code Execution A vulnerability was identified in the `exec_utils` class of the `llama_index` package, specifically within the `safe_eval` function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.
Metadata
Created: 2024-04-10T18:30:48Z
Modified: 2024-04-10T22:20:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-wvpx-g427-q9wc/GHSA-wvpx-g427-q9wc.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-wvpx-g427-q9wc
Finding: F422
Auto approve: 1