Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02cDU1LXFyM2otbXBncc4ABA9H
AgentScope uses `eval`
In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py
has the function is_callable_expression
. Within this function, the line result = eval(s)
poses a security risk as it can directly execute user-provided commands.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02cDU1LXFyM2otbXBncc4ABA9H
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 2 days ago
Updated: 1 day ago
Identifiers: GHSA-6p55-qr3j-mpgq, CVE-2024-48050
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-48050
- https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d
- https://rumbling-slice-eb0.notion.site/Unauthenticated-Remote-Code-Execution-via-The-use-of-eval-in-is_callable_expression-and-sanitize_nod-cd4ea6c576da4e0b965ef596855c298d
- https://github.com/modelscope/agentscope/blob/main/src/agentscope/web/workstation/workflow_utils.py#L11
- https://github.com/advisories/GHSA-6p55-qr3j-mpgq
Blast Radius: 1.0
Affected Packages
pypi:agentscope
Dependent packages: 0Dependent repositories: 0
Downloads: 6,197 last month
Affected Version Ranges: <= 0.1.0
No known fixed version
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.1.0