An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS1nOTloLTU2bXctODI2M84ABIbT

High EPSS: 0.00093% (0.2724 Percentile) EPSS:

LLama-Index CLI OS command injection vulnerability

Affected Packages Affected Versions Fixed Versions
pypi:llama-index-cli < 0.4.1 0.4.1
7 Dependent packages
0 Dependent repositories
2,279,996 Downloads last month

Affected Version Ranges

All affected versions

0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.1.9, 0.1.10, 0.1.11, 0.1.12, 0.1.13, 0.3.0, 0.3.1, 0.4.0

All unaffected versions

0.4.1, 0.4.2, 0.4.3, 0.4.4

LLama-Index CLI prior to v0.4.1, corresponding to LLama-Index prior to v0.12.21, contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the --files argument, which is directly passed into os.system. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system.

References: