The `add_llm` function in `llm_app.py` in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input `req['llm_factory']` and `req['llm_name']` to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for 'llm_factory' that, when used as an index to these model dictionaries, results in the execution of arbitrary code.
History

Fri, 01 Nov 2024 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:infiniflow:ragflow:0.11.0:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 22 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 22 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 21 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Infiniflow
Infiniflow ragflow
CPEs cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:*
Vendors & Products Infiniflow
Infiniflow ragflow
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 19 Oct 2024 04:00:00 +0000

Type Values Removed Values Added
Description The `add_llm` function in `llm_app.py` in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input `req['llm_factory']` and `req['llm_name']` to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for 'llm_factory' that, when used as an index to these model dictionaries, results in the execution of arbitrary code.
Title Remote Code Execution in infiniflow/ragflow
Weaknesses CWE-77
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-10-19T03:50:09.553Z

Updated: 2024-10-22T19:11:02.208Z

Reserved: 2024-10-18T14:55:10.088Z

Link: CVE-2024-10131

cve-icon Vulnrichment

Updated: 2024-10-21T16:57:59.995Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-19T04:15:05.300

Modified: 2024-11-01T17:12:26.297

Link: CVE-2024-10131

cve-icon Redhat

No data.