logo

CVE-2024-5565 vanna

Package

Manager: pip
Name: vanna
Vulnerable Version: >=0 <=0.5.5

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.05104 pctl0.89429

Details

Vanna prompt injection code execution The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s “ask” method with "visualize" set to True (default behavior) leads to remote code execution.

Metadata

Created: 2024-05-31T15:30:37Z
Modified: 2024-11-25T19:31:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-7735-w2jp-gvg6/GHSA-7735-w2jp-gvg6.json
CWE IDs: ["CWE-77", "CWE-94"]
Alternative ID: GHSA-7735-w2jp-gvg6
Finding: F422
Auto approve: 1