Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03NzM1LXcyanAtZ3ZnNs4AA8k8
Vanna prompt injection code execution
The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s “ask” method with "visualize" set to True (default behavior) leads to remote code execution.
Permalink: https://github.com/advisories/GHSA-7735-w2jp-gvg6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03NzM1LXcyanAtZ3ZnNs4AA8k8
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 6 months ago
Updated: 5 months ago
CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-7735-w2jp-gvg6, CVE-2024-5565
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-5565
- https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449
- https://github.com/advisories/GHSA-7735-w2jp-gvg6
Affected Packages
pypi:vanna
Dependent packages: 2Dependent repositories: 1
Downloads: 120,313 last month
Affected Version Ranges: <= 0.5.5
No known fixed version
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.0.13, 0.0.14, 0.0.15, 0.0.16, 0.0.17, 0.0.18, 0.0.19, 0.0.20, 0.0.21, 0.0.22, 0.0.23, 0.0.24, 0.0.25, 0.0.26, 0.0.27, 0.0.28, 0.0.29, 0.0.30, 0.0.31, 0.0.32, 0.0.33, 0.0.34, 0.0.35, 0.0.36, 0.0.37, 0.0.38, 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5