Lucene search

K
osvGoogleOSV:GHSA-WVPX-G427-Q9WC
HistoryApr 10, 2024 - 6:30 p.m.

llama-index-core Prompt Injection vulnerability leading to Arbitrary Code Execution

2024-04-1018:30:48
Google
osv.dev
6
exec utils class
prompt injection
arbitrary code execution
input validation
method restrictions
unauthorized code
cve-2023-39662
proof of concept
file creation
software vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

68.1%

A vulnerability was identified in the exec_utils class of the llama_index package, specifically within the safe_eval function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

68.1%

Related for OSV:GHSA-WVPX-G427-Q9WC