logo

CVE-2024-3098 llama-index-core

Package

Manager: pip
Name: llama-index-core
Vulnerable Version: >=0 <0.10.24

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00146 pctl0.35646

Details

llama-index-core Prompt Injection vulnerability leading to Arbitrary Code Execution A vulnerability was identified in the `exec_utils` class of the `llama_index` package, specifically within the `safe_eval` function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.

Metadata

Created: 2024-04-10T18:30:48Z
Modified: 2024-04-10T22:20:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-wvpx-g427-q9wc/GHSA-wvpx-g427-q9wc.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-wvpx-g427-q9wc
Finding: F422
Auto approve: 1