llama-index-core@0.10.5a7 vulnerabilities

Interface between LLMs and your data

  • latest version

    0.14.10

  • latest non vulnerable version

  • first published

    1 years ago

  • latest version published

    9 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the llama-index-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Insecure Temporary File

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Insecure Temporary File due to setting the NLTK data directory to a shared, world-writable subdirectory. An attacker can overwrite, delete, or corrupt data files by exploiting the shared cache directory in a multi-user environment.

    How to fix Insecure Temporary File?

    Upgrade llama-index-core to version 0.12.50 or higher.

    [,0.12.50)
    • H
    Creation of Temporary File With Insecure Permissions

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Creation of Temporary File With Insecure Permissions via the get_cache_dir function, which uses a predictable and hardcoded directory path /tmp/llama_index without proper security controls. An attacker can access or manipulate sensitive files by exploiting this predictable path, potentially stealing proprietary models, poisoning cached embeddings, or conducting symlink attacks.

    Note: This is only exploitable if multiple users share the same Linux system.

    How to fix Creation of Temporary File With Insecure Permissions?

    Upgrade llama-index-core to version 0.12.50 or higher.

    [0,0.12.50)
    • H
    Uncontrolled Recursion

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Uncontrolled Recursion via the JSONReader component. An attacker can cause excessive resource consumption and crash the process by submitting deeply nested JSON files.

    How to fix Uncontrolled Recursion?

    Upgrade llama-index-core to version 0.12.38 or higher.

    [,0.12.38)
    • C
    Arbitrary File Write via Archive Extraction (Zip Slip)

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) via the encode_image function. An attacker can access arbitrary files on the server by supplying crafted image_path values containing path traversal sequences.

    How to fix Arbitrary File Write via Archive Extraction (Zip Slip)?

    Upgrade llama-index-core to version 0.12.41 or higher.

    [,0.12.41)
    • H
    Deserialization of Untrusted Data

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the JsonPickleSerializer process. An attacker can execute arbitrary code by submitting specially crafted serialized data that triggers the insecure fallback to Python's pickle module.

    How to fix Deserialization of Untrusted Data?

    Upgrade llama-index-core to version 0.12.41 or higher.

    [,0.12.41)
    • H
    Uncontrolled Recursion

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Uncontrolled Recursion via the JSONReader process. An attacker can cause the application to crash by submitting deeply nested JSON structures, resulting in a stack overflow and service disruption.

    How to fix Uncontrolled Recursion?

    Upgrade llama-index-core to version 0.12.38 or higher.

    [,0.12.38)
    • C
    SQL Injection

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to SQL Injection through multiple vector store integrations. An attacker can read and write data using SQL, potentially leading to unauthorized access to data of other users depending on the usage of the library in a web application.

    How to fix SQL Injection?

    Upgrade llama-index-core to version 0.12.29 or higher.

    [,0.12.29)
    • H
    Improper Handling of Exceptional Conditions

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Improper Handling of Exceptional Conditions via the stream_complete method of the LangChainLLM class. An attacker can disrupt service availability by providing an input of type integer instead of a string and causing an error in the stream function where the thread terminates due to the error, but the process continues to run.

    How to fix Improper Handling of Exceptional Conditions?

    Upgrade llama-index-core to version 0.12.6 or higher.

    [,0.12.6)
    • H
    SQL Injection

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to SQL Injection in the default_jsonalyzer() function, which may allow arbitrary file writes or denial of service by occupying database resources. An attacker who can inject SQL into a prompt can cause the SQL commands to be run on the underlying sqlite instance, including ATTACH FILE commands, which create files on the filesystem.

    How to fix SQL Injection?

    Upgrade llama-index-core to version 0.12.3 or higher.

    [,0.12.3)
    • C
    Improper Control of Generation of Code ('Code Injection')

    llama-index-core is an Interface between LLMs and your data

    Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to insufficient validation of input in the exec_utils class, specifically within the safe_eval function. An attacker can bypass method restrictions and execute unauthorized code by exploiting the flaw. This vulnerability is a bypass of the CVE-2023-39662 fix.

    How to fix Improper Control of Generation of Code ('Code Injection')?

    Upgrade llama-index-core to version 0.10.24 or higher.

    [,0.10.24)