Описание
An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.
A flaw was found in Ragas. Improper validation of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs leads to Server-Side Request Forgery (SSRF). This vulnerability allows attackers to perform arbitrary file reads, conduct internal port scans and access cloud metadata.
Отчет
To exploit this flaw, an attacker needs to supply malicious input to a Ragas evaluation pipeline, typically by poisoning a dataset or submitting payloads directly via an API. This issue allows arbitrary file reads, internal port scans and access to cloud metadata, but it does not cause memory corruption or arbitrary command execution. Due to these reasons, this vulnerability has been rated with an important severity.
Меры по смягчению последствий
To mitigate this vulnerability, implement strict input validation to filter out malicious payloads before passing the retrieved_contexts parameter to the Ragas evaluation pipeline. Specifically, enforce an allowlist that only accepts http:// or https:// URLs, explicitly rejecting the file:// scheme. Additionally, ensure the account running the Ragas process operates with principle of least privilege, restricting access to sensitive system files.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift AI (RHOAI) | rhoai/odh-llama-stack-core-rhel9 | Not affected | ||
| Red Hat OpenShift AI (RHOAI) | rhoai/odh-trustyai-ragas-lls-provider-dsp-rhel9 | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.
RAGAS has an Arbitrary File Read vulnerability
EPSS
7.5 High
CVSS3