logo

CVE-2024-3271 llama-index-core

Package

Manager: pip
Name: llama-index-core
Vulnerable Version: >=0 <0.10.24

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0227 pctl0.84023

Details

llama-index-core Command Injection vulnerability A command injection vulnerability exists in the run-llama/llama_index repository, specifically within the safe_eval function. Attackers can bypass the intended security mechanism, which checks for the presence of underscores in code generated by LLM, to execute arbitrary code. This is achieved by crafting input that does not contain an underscore but still results in the execution of OS commands. The vulnerability allows for remote code execution (RCE) on the server hosting the application.

Metadata

Created: 2024-04-16T00:30:34Z
Modified: 2024-04-16T18:26:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-r6gp-rff2-p3hf/GHSA-r6gp-rff2-p3hf.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-r6gp-rff2-p3hf
Finding: F422
Auto approve: 1