RAIL documents are an XML-based format invented by Guardrails AI to enforce formatting checks on LLM outputs. Guardrails users that consume RAIL documents from external sources are vulnerable to XXE, which may cause leakage of internal file data via the SYSTEM entity.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2333 | RAIL documents are an XML-based format invented by Guardrails AI to enforce formatting checks on LLM outputs. Guardrails users that consume RAIL documents from external sources are vulnerable to XXE, which may cause leakage of internal file data via the SYSTEM entity. |
Github GHSA |
GHSA-f8hx-f4xw-c646 | Guardrails AI vulnerable to Improper Restriction of XML External Entity Reference |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 25 Nov 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Guardrailsai
Guardrailsai guardrails |
|
| CPEs | cpe:2.3:a:guardrailsai:guardrails:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Guardrailsai
Guardrailsai guardrails |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-11-25T12:48:07.911Z
Reserved: 2024-07-21T09:58:10.956Z
Link: CVE-2024-6961
Updated: 2024-08-01T21:45:38.455Z
Status : Awaiting Analysis
Published: 2024-07-21T11:15:03.187
Modified: 2024-11-25T13:15:07.930
Link: CVE-2024-6961
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA