Description
RAIL documents are an XML-based format invented by Guardrails AI to enforce formatting checks on LLM outputs. Guardrails users that consume RAIL documents from external sources are vulnerable to XXE, which may cause leakage of internal file data via the SYSTEM entity.
Published: 2024-07-21
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2333 RAIL documents are an XML-based format invented by Guardrails AI to enforce formatting checks on LLM outputs. Guardrails users that consume RAIL documents from external sources are vulnerable to XXE, which may cause leakage of internal file data via the SYSTEM entity.
Github GHSA Github GHSA GHSA-f8hx-f4xw-c646 Guardrails AI vulnerable to Improper Restriction of XML External Entity Reference
History

Mon, 25 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Guardrailsai
Guardrailsai guardrails
CPEs cpe:2.3:a:guardrailsai:guardrails:*:*:*:*:*:*:*:*
Vendors & Products Guardrailsai
Guardrailsai guardrails
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Guardrailsai Guardrails
cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-11-25T12:48:07.911Z

Reserved: 2024-07-21T09:58:10.956Z

Link: CVE-2024-6961

cve-icon Vulnrichment

Updated: 2024-08-01T21:45:38.455Z

cve-icon NVD

Status : Deferred

Published: 2024-07-21T11:15:03.187

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-6961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses