Enviar #752774: Hugging Face smolagents 1.24.0 Server-Side Request Forgeryinformación

TítuloHugging Face smolagents 1.24.0 Server-Side Request Forgery
DescripciónThe smolagents library's LocalPythonExecutor component fails to implement network egress filtering. When a user configures the executor with authorized network-capable modules (e.g., requests), the sandbox environment does not prevent the Agent from accessing sensitive internal infrastructure or cloud metadata services (e.g., x.x.x.x). This leads to Server-Side Request Forgery (SSRF) and potential data exfiltration via Out-of-Band (OOB) techniques. Furthermore, the provided Starlette/Gradio server examples lack default authentication, exacerbating the risk of remote exploitation.
Fuente⚠️ https://github.com/CH0ico/CVE_choco_smolagent/tree/main
Usuario
 Choco094late (UID 75875)
Sumisión2026-02-05 10:46 (hace 3 meses)
Moderación2026-02-18 07:39 (13 days later)
EstadoAceptado
Entrada de VulDB346451 [huggingface smolagents 1.24.0 LocalPythonExecutor requests.get/requests.post escalada de privilegios]
Puntos20

Do you know our Splunk app?

Download it now for free!