Логотип exploitDog
bind:CVE-2024-3271
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-3271

Количество 2

Количество 2

nvd логотип

CVE-2024-3271

почти 2 года назад

A command injection vulnerability exists in the run-llama/llama_index repository, specifically within the safe_eval function. Attackers can bypass the intended security mechanism, which checks for the presence of underscores in code generated by LLM, to execute arbitrary code. This is achieved by crafting input that does not contain an underscore but still results in the execution of OS commands. The vulnerability allows for remote code execution (RCE) on the server hosting the application.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-r6gp-rff2-p3hf

почти 2 года назад

llama-index-core Command Injection vulnerability

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-3271

A command injection vulnerability exists in the run-llama/llama_index repository, specifically within the safe_eval function. Attackers can bypass the intended security mechanism, which checks for the presence of underscores in code generated by LLM, to execute arbitrary code. This is achieved by crafting input that does not contain an underscore but still results in the execution of OS commands. The vulnerability allows for remote code execution (RCE) on the server hosting the application.

CVSS3: 9.8
2%
Низкий
почти 2 года назад
github логотип
GHSA-r6gp-rff2-p3hf

llama-index-core Command Injection vulnerability

CVSS3: 9.8
2%
Низкий
почти 2 года назад

Уязвимостей на страницу