| Titre | Hugging Face smolagents 1.24.0 Server-Side Request Forgery |
|---|
| Description | The smolagents library's LocalPythonExecutor component fails to implement network egress filtering. When a user configures the executor with authorized network-capable modules (e.g., requests), the sandbox environment does not prevent the Agent from accessing sensitive internal infrastructure or cloud metadata services (e.g., x.x.x.x). This leads to Server-Side Request Forgery (SSRF) and potential data exfiltration via Out-of-Band (OOB) techniques. Furthermore, the provided Starlette/Gradio server examples lack default authentication, exacerbating the risk of remote exploitation. |
|---|
| La source | ⚠️ https://github.com/CH0ico/CVE_choco_smolagent/tree/main |
|---|
| Utilisateur | Choco094late (UID 75875) |
|---|
| Soumission | 05/02/2026 10:46 (il y a 3 mois) |
|---|
| Modérer | 18/02/2026 07:39 (13 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 346451 [huggingface smolagents 1.24.0 LocalPythonExecutor requests.get/requests.post élévation de privilèges] |
|---|
| Points | 20 |
|---|