Логотип exploitDog
bind:CVE-2024-5565
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-5565

Количество 2

Количество 2

nvd логотип

CVE-2024-5565

больше 1 года назад

The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s “ask” method with "visualize" set to True (default behavior) leads to remote code execution.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-7735-w2jp-gvg6

больше 1 года назад

Vanna prompt injection code execution

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-5565

The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s “ask” method with "visualize" set to True (default behavior) leads to remote code execution.

CVSS3: 8.1
6%
Низкий
больше 1 года назад
github логотип
GHSA-7735-w2jp-gvg6

Vanna prompt injection code execution

CVSS3: 8.1
6%
Низкий
больше 1 года назад

Уязвимостей на страницу