Логотип exploitDog
bind:CVE-2025-6210
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6210

Количество 3

Количество 3

redhat логотип

CVE-2025-6210

5 месяцев назад

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

CVSS3: 4
EPSS: Низкий
nvd логотип

CVE-2025-6210

5 месяцев назад

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-3j8r-jf9w-5cmh

5 месяцев назад

LlamaIndex vulnerability in its ObsidianReader class can lead to Path Traversal exploit

CVSS3: 6.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-6210

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

CVSS3: 4
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-6210

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

CVSS3: 6.2
0%
Низкий
5 месяцев назад
github логотип
GHSA-3j8r-jf9w-5cmh

LlamaIndex vulnerability in its ObsidianReader class can lead to Path Traversal exploit

CVSS3: 6.2
0%
Низкий
5 месяцев назад

Уязвимостей на страницу