A vulnerability was identified in the `exec_utils` class of the `llama_index` package, specifically within the `safe_eval` function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.
References
Configurations
No configuration.
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/run-llama/llama_index/commit/5fbcb5a8b9f20f81b791c7fc8849e352613ab475 - | |
References | () https://huntr.com/bounties/1bce0d61-ad03-4b22-bc32-8f99f92974e7 - | |
Summary |
|
10 Apr 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 17:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-3098
Mitre link : CVE-2024-3098
CVE.ORG link : CVE-2024-3098
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')