Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-7707

Опубликовано: 13 окт. 2025
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

The llama_index library version 0.12.33 sets the NLTK data directory to a subdirectory of the codebase by default, which is world-writable in multi-user environments. This configuration allows local users to overwrite, delete, or corrupt NLTK data files, leading to potential denial of service, data tampering, or privilege escalation. The vulnerability arises from the use of a shared cache directory instead of a user-specific one, making it susceptible to local data tampering and denial of service.

The llama_index library sets the NLTK data directory to a subdirectory of the codebase by default (e.g., _static/nltk_cache inside the package directory). In multi-user environments or shared hosting, this directory is world-writable or accessible by multiple users. As a result, any user can overwrite, delete, or corrupt NLTK data files, leading to denial of service, data tampering, or potentially privilege escalation if a vulnerable data loader is present.

Отчет

Availability impact of this flaw is limited to the application which bundles llama_index. The host operating system is not at risk of availability impact.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-minimal-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-minimal-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-supported-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-supported-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/platform-resource-runner-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/aap-cloud-metrics-collector-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-377
https://bugzilla.redhat.com/show_bug.cgi?id=2403577llama-index: World-Writable Cache Directory Vulnerability in llama_index

EPSS

Процентиль: 7%
0.00024
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
6 месяцев назад

The llama_index library version 0.12.33 sets the NLTK data directory to a subdirectory of the codebase by default, which is world-writable in multi-user environments. This configuration allows local users to overwrite, delete, or corrupt NLTK data files, leading to potential denial of service, data tampering, or privilege escalation. The vulnerability arises from the use of a shared cache directory instead of a user-specific one, making it susceptible to local data tampering and denial of service.

CVSS3: 7.1
github
6 месяцев назад

llama-index has Insecure Temporary File

EPSS

Процентиль: 7%
0.00024
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2025-7707