Логотип exploitDog
bind:CVE-2024-6982
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6982

Количество 2

Количество 2

nvd логотип

CVE-2024-6982

11 месяцев назад

A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's `eval()` function to evaluate mathematical expressions within a Python sandbox that disables `__builtins__` and only allows functions from the `math` module. This sandbox can be bypassed by loading the `os` module using the `_frozen_importlib.BuiltinImporter` class, allowing an attacker to execute arbitrary commands on the server. The issue is fixed in version 9.10.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-jccx-m9v4-9hwh

11 месяцев назад

LoLLMS Code Injection vulnerability

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6982

A remote code execution vulnerability exists in the Calculate function of parisneo/lollms version 9.8. The vulnerability arises from the use of Python's `eval()` function to evaluate mathematical expressions within a Python sandbox that disables `__builtins__` and only allows functions from the `math` module. This sandbox can be bypassed by loading the `os` module using the `_frozen_importlib.BuiltinImporter` class, allowing an attacker to execute arbitrary commands on the server. The issue is fixed in version 9.10.

CVSS3: 8.4
0%
Низкий
11 месяцев назад
github логотип
GHSA-jccx-m9v4-9hwh

LoLLMS Code Injection vulnerability

CVSS3: 8.4
0%
Низкий
11 месяцев назад

Уязвимостей на страницу