Lucene search

K
githubGitHub Advisory DatabaseGHSA-WVPX-G427-Q9WC
HistoryApr 10, 2024 - 6:30 p.m.

llama-index-core Prompt Injection vulnerability leading to Arbitrary Code Execution

2024-04-1018:30:48
CWE-94
GitHub Advisory Database
github.com
10
vulnerability
arbitrary code execution
safe eval function
input validation
method restrictions
unauthorized code
cve-2023-39662
proof of concept
file creation
system exploit
software

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0.004

Percentile

75.5%

A vulnerability was identified in the exec_utils class of the llama_index package, specifically within the safe_eval function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.

Affected configurations

Vulners
Node
quotes_llama_projectquotes_llamaRange<0.10.24wordpress
VendorProductVersionCPE
quotes_llama_projectquotes_llama*cpe:2.3:a:quotes_llama_project:quotes_llama:*:*:*:*:*:wordpress:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0.004

Percentile

75.5%