CVE-2024-4181

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-4181
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-4181.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-4181
Aliases
Published
2024-05-16T09:15:15Z
Modified
2024-10-11T07:52:20Z
Summary
[none]
Details

A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines.

References

Affected packages

Git / github.com/run-llama/llama_index

Affected ranges

Type
GIT
Repo
https://github.com/run-llama/llama_index
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed