Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-10131

Опубликовано: 19 окт. 2024
Источник: nvd
CVSS3: 8.8
CVSS3: 8.8
EPSS Низкий

Описание

The add_llm function in llm_app.py in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input req['llm_factory'] and req['llm_name'] to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for 'llm_factory' that, when used as an index to these model dictionaries, results in the execution of arbitrary code.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:infiniflow:ragflow:0.11.0:*:*:*:*:*:*:*

EPSS

Процентиль: 84%
0.02207
Низкий

8.8 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
github
больше 1 года назад

The `add_llm` function in `llm_app.py` in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input `req['llm_factory']` and `req['llm_name']` to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for 'llm_factory' that, when used as an index to these model dictionaries, results in the execution of arbitrary code.

EPSS

Процентиль: 84%
0.02207
Низкий

8.8 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-94