| タイトル | premsql v0.2.1 Code Injection |
|---|
| 説明 | A Remote Code Execution (RCE) vulnerability exists in the premsql library due to the unsafe usage of eval() on language model outputs. An attacker can use prompt injection to force the LLM to output malicious Python code, which is then executed by the server.
```python
try:
result = self.generator.generate(
data_blob={"prompt": prompt},
temperature=temperature,
max_new_tokens=max_new_tokens,
postprocess=False,
)
# VULNERABILITY HERE:
result = eval(result.replace("null", "None"))
error_from_model = None
assert "alternate_decision" in result
assert "suggestion" in result
```
The `result` variable contains the raw string output from the LLM. The application attempts to parse this as a Python dictionary using `eval()`. However, if the LLM output is manipulated to contain valid Python commands (e.g., `__import__('os').system('calc')`), `eval()` will execute them. |
|---|
| ソース | ⚠️ https://github.com/Ka7arotto/cve/blob/main/premsql-rce/issue.md |
|---|
| ユーザー | Goku (UID 80486) |
|---|
| 送信 | 2026年03月21日 02:50 (17 日 ago) |
|---|
| モデレーション | 2026年04月05日 07:12 (15 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 355388 [premAI-io premsql 迄 0.2.1 followup.py eval result 特権昇格] |
|---|
| ポイント | 20 |
|---|