Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wx43-g55g-2jf4

Опубликовано: 10 апр. 2024
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

LocalAI Command Injection in audioToWav

A command injection vulnerability exists in the TranscriptEndpoint of mudler/localai, specifically within the audioToWav function used for converting audio files to WAV format for transcription. The vulnerability arises due to the lack of sanitization of user-supplied filenames before passing them to ffmpeg via a shell command, allowing an attacker to execute arbitrary commands on the host system. Successful exploitation could lead to unauthorized access, data breaches, or other detrimental impacts, depending on the privileges of the process executing the code.

Пакеты

Наименование

github.com/go-skynet/LocalAI

go
Затронутые версииВерсия исправления

< 2.10.0

2.10.0

EPSS

Процентиль: 82%
0.01829
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 9.8
nvd
почти 2 года назад

A command injection vulnerability exists in the `TranscriptEndpoint` of mudler/localai, specifically within the `audioToWav` function used for converting audio files to WAV format for transcription. The vulnerability arises due to the lack of sanitization of user-supplied filenames before passing them to ffmpeg via a shell command, allowing an attacker to execute arbitrary commands on the host system. Successful exploitation could lead to unauthorized access, data breaches, or other detrimental impacts, depending on the privileges of the process executing the code.

EPSS

Процентиль: 82%
0.01829
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-78