
Cloud Vulnerability DB
A community-led vulnerabilities database
A command injection vulnerability (CVE-2024-3271) exists in the run-llama/llamaindex repository, specifically within the safeeval function. The vulnerability was discovered and disclosed on April 15, 2024. The issue affects the LLM code generation security mechanism that checks for underscores in generated code (NVD).
The vulnerability allows attackers to bypass the intended security mechanism that checks for the presence of underscores in code generated by LLM. The bypass is achieved by crafting input that does not contain an underscore but still results in the execution of OS commands. The vulnerability has been assigned a CVSS v3.0 base score of 9.8 (CRITICAL) with the vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high severity across confidentiality, integrity, and availability impacts (NVD).
The vulnerability allows for remote code execution (RCE) on the server hosting the application. This means attackers can execute arbitrary code, potentially leading to complete system compromise. The critical CVSS score of 9.8 indicates severe potential impacts on system security (NVD).
A patch has been released that implements stricter access controls to built-ins in the pandas query engine. The fix includes additional checks for disallowed built-ins and improved error messaging when detecting unauthorized access attempts (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."