Description
A vulnerability was identified in the `exec_utils` class of the `llama_index` package, specifically within the `safe_eval` function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.
Published: 2024-04-10
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1326 A vulnerability was identified in the `exec_utils` class of the `llama_index` package, specifically within the `safe_eval` function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.
Github GHSA Github GHSA GHSA-wvpx-g427-q9wc llama-index-core Prompt Injection vulnerability leading to Arbitrary Code Execution
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T19:32:42.914Z

Reserved: 2024-03-29T17:32:52.425Z

Link: CVE-2024-3098

cve-icon Vulnrichment

Updated: 2024-08-01T19:32:42.914Z

cve-icon NVD

Status : Deferred

Published: 2024-04-10T17:15:56.213

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-3098

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses