Description

A Python command injection vulnerability exists in the `SagemakerLLM` class's `complete()` method within `./private_gpt/components/llm/custom/sagemaker.py` of the imartinez/privategpt application, versions up to and including 0.3.0. The vulnerability arises due to the use of the `eval()` function to parse a string received from a remote AWS SageMaker LLM endpoint into a dictionary. This method of parsing is unsafe as it can execute arbitrary Python code contained within the response. An attacker can exploit this vulnerability by manipulating the response from the AWS SageMaker LLM endpoint to include malicious Python code, leading to potential execution of arbitrary commands on the system hosting the application. The issue is fixed in version 0.6.0.

INFO

Published Date :

2024-11-14T17:32:38.867Z

Last Modified :

2024-11-18T20:29:54.739Z

Source :

@huntr_ai
AFFECTED PRODUCTS

The following products are affected by CVE-2024-4343 vulnerability.

Vendors Products
Imartinez
  • Imartinez Privategpt
Pribai
  • Privategpt
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-4343.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact