Enviar #784462: premsql v0.2.1 Code Injectioninformación

Títulopremsql v0.2.1 Code Injection
DescripciónA Remote Code Execution (RCE) vulnerability exists in the premsql library due to the unsafe usage of eval() on language model outputs. An attacker can use prompt injection to force the LLM to output malicious Python code, which is then executed by the server. ```python try: result = self.generator.generate( data_blob={"prompt": prompt}, temperature=temperature, max_new_tokens=max_new_tokens, postprocess=False, ) # VULNERABILITY HERE: result = eval(result.replace("null", "None")) error_from_model = None assert "alternate_decision" in result assert "suggestion" in result ``` The `result` variable contains the raw string output from the LLM. The application attempts to parse this as a Python dictionary using `eval()`. However, if the LLM output is manipulated to contain valid Python commands (e.g., `__import__('os').system('calc')`), `eval()` will execute them.
Fuente⚠️ https://github.com/Ka7arotto/cve/blob/main/premsql-rce/issue.md
Usuario
 Goku (UID 80486)
Sumisión2026-03-21 02:50 (hace 19 días)
Moderación2026-04-05 07:12 (15 days later)
EstadoAceptado
Entrada de VulDB355388 [premAI-io premsql hasta 0.2.1 followup.py eval result escalada de privilegios]
Puntos20

Might our Artificial Intelligence support you?

Check our Alexa App!