CVE-2024-6961

RAIL documents are an XML-based format invented by Guardrails AI to enforce formatting checks on LLM outputs. Guardrails users that consume RAIL documents from external sources are vulnerable to XXE, which may cause leakage of internal file data via the SYSTEM entity.
Configurations

No configuration.

History

01 Aug 2024, 14:00

Type Values Removed Values Added
CWE CWE-611

22 Jul 2024, 13:00

Type Values Removed Values Added
Summary
  • (es) Los documentos RAIL son un formato basado en XML inventado por Guardrails AI para aplicar comprobaciones de formato en los resultados de LLM. Los usuarios de Guardrails que consumen documentos RAIL de fuentes externas son vulnerables a XXE, lo que puede provocar una fuga de datos de archivos internos a través de la entidad SYSTEM.

21 Jul 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-21 11:15

Updated : 2024-08-01 14:00


NVD link : CVE-2024-6961

Mitre link : CVE-2024-6961

CVE.ORG link : CVE-2024-6961


JSON object : View

Products Affected

No product.

CWE
CWE-611

Improper Restriction of XML External Entity Reference