Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f3mf-hm6v-jfhh

Опубликовано: 27 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks

From @jackfromeast and @superboy-zjc: We have identified a class pollution vulnerability in Mesop (<= 0.14.0) application that allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application's implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs).

Just like the Javascript's prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequnces like RCE when gadgets are available.

Пакеты

Наименование

mesop

pip
Затронутые версииВерсия исправления

< 0.14.1

0.14.1

EPSS

Процентиль: 86%
0.03115
Низкий

8.1 High

CVSS3

Дефекты

CWE-915

Связанные уязвимости

CVSS3: 8.1
nvd
11 месяцев назад

Mesop is a Python-based UI framework that allows users to build web applications. A class pollution vulnerability in Mesop prior to version 0.14.1 allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application's implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs). Just like the Javascript's prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequences like remote code execution when gadgets are available. Users should upgrade to version 0.14.1 to obtain

EPSS

Процентиль: 86%
0.03115
Низкий

8.1 High

CVSS3

Дефекты

CWE-915