THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-4181

Command Injection in run-llama/llama_index

Assigner@huntr_ai
Reserved2024-04-25
Published2024-05-16
Updated2024-06-04

Description

A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines.



HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code

Product status

Any version before 0.10.13
affected

References

https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1

https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba

cve.org CVE-2024-4181

nvd.nist.gov CVE-2024-4181

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-4181
© Copyright 2024 THREATINT. Made in Cyprus with +