Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3j8r-jf9w-5cmh

Опубликовано: 07 июл. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.2

Описание

LlamaIndex vulnerability in its ObsidianReader class can lead to Path Traversal exploit

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, before version 0.5.2 (specifically in version 0.12.27 of llama-index), allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in llama-index-readers-obsidian version 0.5.2.

Пакеты

Наименование

llama-index-readers-obsidian

pip
Затронутые версииВерсия исправления

< 0.5.2

0.5.2

EPSS

Процентиль: 6%
0.00025
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4
redhat
5 месяцев назад

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

CVSS3: 6.2
nvd
5 месяцев назад

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

EPSS

Процентиль: 6%
0.00025
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-22