Описание
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the encode_image
function in generic_utils.py
. This vulnerability allows an attacker to manipulate the image_path
input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.
A path traversal vulnerability was found in run-llama/llama_index. This vulnerability allows an attacker to manipulate the image_path
input to read files on the server. File access is limited to those files that the running process has permission to read.
Отчет
On Red Hat systems most users are not given access to sensitive files. A compromised process using the llama index will not have access to general system secrets unless it has been given greater permission than it should have.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
OpenShift Lightspeed | openshift-lightspeed/lightspeed-service-api-rhel9 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-24/de-minimal-rhel8 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-24/de-minimal-rhel9 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-24/ee-supported-rhel8 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-24/ee-supported-rhel9 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-25/aap-cloud-metrics-collector-rhel8 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-25/ansible-dev-tools-rhel8 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-25/de-minimal-rhel8 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-25/de-minimal-rhel9 | Fix deferred | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-25/ee-supported-rhel8 | Fix deferred |
Показывать по
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.
LlamaIndex vulnerable to Path Traversal attack through its encode_image function
Уязвимость функции encode_image фреймворка для работы с большими языковыми моделями (LLM) LlamaIndex, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю раскрыть защищаемую информацию
5.3 Medium
CVSS3