CVE-2024-3271 – llama-index-core
Package
Manager: pip
Name: llama-index-core
Vulnerable Version: >=0 <0.10.24
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0227 pctl0.84023
Details
llama-index-core Command Injection vulnerability A command injection vulnerability exists in the run-llama/llama_index repository, specifically within the safe_eval function. Attackers can bypass the intended security mechanism, which checks for the presence of underscores in code generated by LLM, to execute arbitrary code. This is achieved by crafting input that does not contain an underscore but still results in the execution of OS commands. The vulnerability allows for remote code execution (RCE) on the server hosting the application.
Metadata
Created: 2024-04-16T00:30:34Z
Modified: 2024-04-16T18:26:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-r6gp-rff2-p3hf/GHSA-r6gp-rff2-p3hf.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-r6gp-rff2-p3hf
Finding: F422
Auto approve: 1