| 제목 | griptape v0.19.4 Absolute Path Traversal |
|---|
| 설명 | The ComputerTool in Griptape allows agents to execute Python code by first writing the code to a file in a local working directory, which is then mounted into a container for execution. However, the filename parameter, which determines where the code is stored locally, is generated by the LLM and is not properly validated or sanitized. This lack of validation allows for a path traversal vulnerability. An attacker can use prompt injection to coerce the LLM into specifying a filename containing directory traversal sequences (e.g., ../../malicious_file). Since the file content (the code) is also controllable via prompt injection, writing to sensitive files like __init__.py or ~/.bashrc may lead to Remote Code Execution (RCE) on the host system. |
|---|
| 원천 | ⚠️ https://github.com/Ka7arotto/cve/blob/main/griptape/SaveCodeTool/computeTool.md |
|---|
| 사용자 | Goku (UID 80486) |
|---|
| 제출 | 2026. 03. 21. AM 03:05 (17 날 ago) |
|---|
| 모더레이션 | 2026. 04. 05. AM 07:17 (15 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 355391 [griptape-ai griptape 0.19.4 ComputerTool tool.py filename 디렉토리 순회] |
|---|
| 포인트들 | 20 |
|---|