A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.00476 Percentile:
0.6393
CVSS Scoring
CVSS v3.0 Score: 8.8
Severity: HIGH
Mapped CWE(s)
CWE-94
: Improper Control of Generation of Code ('Code Injection')
All CAPEC(s)
CAPEC-242: Code Injection
CAPEC-35: Leverage Executable Code in Non-Executable Files
CAPEC-77: Manipulating User-Controlled Variables
CAPEC(s) with Mapped TTPs
CAPEC-35: Leverage Executable Code in Non-Executable Files
Mapped TTPs: