Отправить #784459: MAC-SQL The latest version SQL InjectionИнформация

НазваниеMAC-SQL The latest version SQL Injection
ОписаниеMAC-SQL is a multi-agent collaborative Text-to-SQL framework that utilizes large language models (LLMs) to convert natural language queries into SQL statements. The system processes user input through three agents (Selector, Decomposer, and Refiner) and executes the generated SQL against SQLite databases without proper validation or sanitization. The vulnerability exists in the complete trust chain between user input, LLM output, and SQL execution. Malicious users can exploit this through prompt injection attacks, manipulating the LLM to generate arbitrary SQL statements that are then executed directly on the database server. The core issue is located in the Refiner agent's _execute_sql method (core/agents.py:672-698), which executes LLM-generated SQL without any filtering: While a 120-second timeout is implemented, it is totally enough for crashing the server
Источник⚠️ https://github.com/Ka7arotto/cve/blob/main/MAC-SQL/issue.md
Пользователь
 Goku (UID 80486)
Представление21.03.2026 02:38 (16 дни назад)
Модерация04.04.2026 23:50 (15 days later)
Статуспринято
Запись VulDB355386 [wbbeyourself MAC-SQL до 31a9df5e0d520be4769be57a4b9022e5e34a14f4 Refiner Agent core/agents.py _execute_sql SQL-инъекция]
Баллы20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!