CVE-2023-39662

An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.
References
Link Resource
https://github.com/jerryjliu/llama_index/issues/7054 Exploit Issue Tracking Third Party Advisory
https://github.com/jerryjliu/llama_index/issues/7054 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:llamaindex_project:llamaindex:*:*:*:*:*:python:*:*

History

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://github.com/jerryjliu/llama_index/issues/7054 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/jerryjliu/llama_index/issues/7054 - Exploit, Issue Tracking, Third Party Advisory
Summary
  • (es) Un problema en llama_index v.0.7.13 y anteriores permite a un atacante remoto ejecutar código arbitrario a través del parámetro `exec` en la función PandasQueryEngine.

Information

Published : 2023-08-15 17:15

Updated : 2024-11-21 08:15


NVD link : CVE-2023-39662

Mitre link : CVE-2023-39662

CVE.ORG link : CVE-2023-39662


JSON object : View

Products Affected

llamaindex_project

  • llamaindex
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')