Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fmrf-6jv9-qjc7

Опубликовано: 07 июл. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

LlamaIndex is vulnerable to Path Traversal attack through its ObsidianReader class

A vulnerability in the ObsidianReader class in LlamaIndex Readers Integration: Obsidian before version 0.5.1 from the run-llama/llama_index repository (versions 0.12.23 to 0.12.28) allows for arbitrary file read through symbolic links. The ObsidianReader fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information.

Пакеты

Наименование

llama-index-readers-obsidian

pip
Затронутые версииВерсия исправления

< 0.5.1

0.5.1

EPSS

Процентиль: 26%
0.0009
Низкий

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.3
redhat
2 месяца назад

A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information.

CVSS3: 7.5
nvd
2 месяца назад

A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information.

EPSS

Процентиль: 26%
0.0009
Низкий

7.5 High

CVSS3

Дефекты

CWE-22