Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-34359

Опубликовано: 14 мая 2024
Источник: nvd
CVSS3: 9.6
EPSS Средний

Описание

llama-cpp-python is the Python bindings for llama.cpp. llama-cpp-python depends on class Llama in llama.py to load .gguf llama.cpp or Latency Machine Learning Models. The __init__ constructor built in the Llama takes several parameters to configure the loading and running of the model. Other than NUMA, LoRa settings, loading tokenizers, and hardware settings, __init__ also loads the chat template from targeted .gguf 's Metadata and furtherly parses it to llama_chat_format.Jinja2ChatFormatter.to_chat_handler() to construct the self.chat_handler for this model. Nevertheless, Jinja2ChatFormatter parse the chat template within the Metadate with sandbox-less jinja2.Environment, which is furthermore rendered in __call__ to construct the prompt of interaction. This allows jinja2 Server Side Template Injection which leads to remote code execution by a carefully constructed payload.

EPSS

Процентиль: 98%
0.5917
Средний

9.6 Critical

CVSS3

Дефекты

CWE-76

Связанные уязвимости

CVSS3: 9.6
github
больше 1 года назад

llama-cpp-python vulnerable to Remote Code Execution by Server-Side Template Injection in Model Metadata

EPSS

Процентиль: 98%
0.5917
Средний

9.6 Critical

CVSS3

Дефекты

CWE-76