In the latest version of vanna-ai/vanna, the `vanna.ask` function is vulnerable to remote code execution due to prompt injection. The root cause is the lack of a sandbox when executing LLM-generated code, allowing an attacker to manipulate the code executed by the `exec` function in `src/vanna/base/base.py`. This vulnerability can be exploited by an attacker to achieve remote code execution on the app backend server, potentially gaining full control of the server.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-27T18:40:37.441Z

Updated: 2024-08-01T21:25:02.677Z

Reserved: 2024-06-10T22:43:12.603Z

Link: CVE-2024-5826

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:02.677Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-27T19:15:17.350

Modified: 2024-11-21T09:48:24.490

Link: CVE-2024-5826

cve-icon Redhat

No data.