GHSA-7735-w2jp-gvg6

Suggest an improvement
Source
https://github.com/advisories/GHSA-7735-w2jp-gvg6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-7735-w2jp-gvg6/GHSA-7735-w2jp-gvg6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7735-w2jp-gvg6
Aliases
  • CVE-2024-5565
Published
2024-05-31T15:30:37Z
Modified
2024-11-25T19:51:03.219724Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.2 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Vanna prompt injection code execution
Details

The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s “ask” method with "visualize" set to True (default behavior) leads to remote code execution.

Database specific
{
    "cwe_ids": [
        "CWE-77",
        "CWE-94"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2024-05-31T15:15:09Z",
    "severity": "CRITICAL",
    "github_reviewed_at": "2024-06-04T15:15:51Z"
}
References

Affected packages

PyPI / vanna

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.5.5

Affected versions

0.*
0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.11
0.0.12
0.0.13
0.0.14
0.0.15
0.0.16
0.0.17
0.0.18
0.0.19
0.0.20
0.0.21
0.0.22
0.0.23
0.0.24
0.0.25
0.0.26
0.0.27
0.0.28
0.0.29
0.0.30
0.0.31
0.0.32
0.0.33
0.0.34
0.0.35
0.0.36
0.0.37
0.0.38
0.1.0
0.1.1
0.2.0
0.2.1
0.3.0
0.3.1
0.3.2
0.3.3
0.3.4
0.4.0
0.4.1
0.4.2
0.4.3
0.5.0
0.5.1
0.5.2
0.5.3
0.5.4
0.5.5

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-7735-w2jp-gvg6/GHSA-7735-w2jp-gvg6.json"