Lucene search

K
githubGitHub Advisory DatabaseGHSA-7735-W2JP-GVG6
HistoryMay 31, 2024 - 3:30 p.m.

Vanna prompt injection code execution

2024-05-3115:30:37
CWE-77
GitHub Advisory Database
github.com
vanna library
prompt injection
code execution
python
remote code execution

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s β€œask” method with β€œvisualize” set to True (default behavior) leads to remote code execution.

Affected configurations

Vulners
Node
vannaRange≀0.5.5
CPENameOperatorVersion
vannale0.5.5

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-7735-W2JP-GVG6