Lucene search

K
vulnrichmentJFROGVULNRICHMENT:CVE-2024-5565
HistoryMay 31, 2024 - 2:24 p.m.

CVE-2024-5565 Prompt Injection in "ask" API with visualization leads to RCE

2024-05-3114:24:21
JFROG
github.com
3
cve-2024-5565
prompt injection
ask api
visualization
rce
vanna library
prompt function
python code
remote code execution

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s β€œask” method with β€œvisualize” set to True (default behavior) leads to remote code execution.

CNA Affected

[
  {
    "collectionURL": "https://pypi.org/project/pip",
    "defaultStatus": "affected",
    "packageName": "vanna",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "python"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Related for VULNRICHMENT:CVE-2024-5565