Опубликовано: 05 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.9
CVSS3: 9.8
Описание
AgentScope uses eval
In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py has the function is_callable_expression. Within this function, the line result = eval(s) poses a security risk as it can directly execute user-provided commands.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-48050
- https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d
- https://github.com/modelscope/agentscope/blob/main/src/agentscope/web/workstation/workflow_utils.py#L11
- https://rumbling-slice-eb0.notion.site/Unauthenticated-Remote-Code-Execution-via-The-use-of-eval-in-is_callable_expression-and-sanitize_nod-cd4ea6c576da4e0b965ef596855c298d
Пакеты
Наименование
agentscope
pip
Затронутые версииВерсия исправления
<= 0.1.0
Отсутствует
EPSS
Процентиль: 34%
0.00138
Низкий
8.9 High
CVSS4
9.8 Critical
CVSS3
CVE ID
Дефекты
CWE-94
CWE-95
Связанные уязвимости
CVSS3: 9.8
nvd
больше 1 года назад
In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py has the function is_callable_expression. Within this function, the line result = eval(s) poses a security risk as it can directly execute user-provided commands.
EPSS
Процентиль: 34%
0.00138
Низкий
8.9 High
CVSS4
9.8 Critical
CVSS3
CVE ID
Дефекты
CWE-94
CWE-95