CVE-2024-45858

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') (CWE-95)

Published: Sep 18, 2024 / Updated: 2mo ago

010
CVSS 7.8EPSS 0.04%High
CVE info copied to clipboard

Summary

An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a maliciously crafted XML file containing Python code, the code will be passed to an eval function, causing it to execute on the user's machine.

Impact

This vulnerability allows attackers to execute arbitrary Python code on the victim's machine. The impact could include unauthorized access to sensitive data, system compromise, installation of malware, or further lateral movement within the network. Given that Guardrails is an AI framework, this could potentially lead to manipulation of AI models or data, compromising the integrity and security of AI-driven systems.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been addressed, as indicated by the patch details provided by Github Advisory on September 18, 2024.

Mitigation

1. Update the Guardrails AI Guardrails framework to a version newer than 0.5.10 as soon as possible. 2. If immediate updating is not possible, implement strict input validation for XML files before processing them with the Guardrails framework. 3. Limit the permissions and access rights of processes running the Guardrails framework to minimize potential damage from code execution. 4. Monitor systems for suspicious activities, especially those related to unexpected Python code execution. 5. Implement network segmentation to isolate systems running the vulnerable versions of the Guardrails framework.

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (5001032)

Sep 18, 2024 at 7:53 AM
CVE Assignment

NVD published the first details for CVE-2024-45858

Sep 18, 2024 at 3:15 PM
CVSS

A CVSS base score of 7.8 has been assigned.

Sep 18, 2024 at 3:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-45858. See article

Sep 18, 2024 at 3:20 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 18, 2024 at 3:20 PM
Vendor Advisory

GitHub Advisories released a security advisory.

Sep 18, 2024 at 3:30 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Sep 19, 2024 at 9:45 AM
CVSS

A CVSS base score of 7.8 has been assigned.

Sep 20, 2024 at 12:38 PM / nvd
Static CVE Timeline Graph

Patches

Github Advisory
+null more

Attack Patterns

CAPEC-35: Leverage Executable Code in Non-Executable Files
+null more

Vendor Advisory

[GHSA-w392-75q8-vr67] Guardrails has an arbitrary code execution vulnerability
GitHub Security Advisory: GHSA-w392-75q8-vr67 Release Date: 2024-09-18 Update Date: 2024-09-18 Severity: High CVE-2024-45858 Package Information Package: guardrails-ai Affected Versions: >= 0.2.9, Patched Versions: 0.5.10 Description An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a maliciously crafted XML file containing Python code, the code will be passed to an eval function, causing it to execute on the user's machine. References https://nvd.nist.gov/vuln/detail/CVE-2024-45858 https://hiddenlayer.com/sai-security-advisory/2024-09-guardrails guardrails-ai/guardrails@ab12701

News

Security Bulletin 25 Sep 2024 - Cyber Security Agency of Singapore
CVE-2024-9014, pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to ...
NA - CVE-2024-45858 - An arbitrary code execution vulnerability...
An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a...
[GHSA-w392-75q8-vr67] Guardrails has an arbitrary code execution vulnerability
GitHub Security Advisory: GHSA-w392-75q8-vr67 Release Date: 2024-09-18 Update Date: 2024-09-18 Severity: High CVE-2024-45858 Package Information Package: guardrails-ai Affected Versions: >= 0.2.9, Patched Versions: 0.5.10 Description An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a maliciously crafted XML file containing Python code, the code will be passed to an eval function, causing it to execute on the user's machine. References https://nvd.nist.gov/vuln/detail/CVE-2024-45858 https://hiddenlayer.com/sai-security-advisory/2024-09-guardrails guardrails-ai/guardrails@ab12701
CVE-2024-45858 | Guardrails AI up to 0.5.9 XML neutralization of directives
A vulnerability was found in Guardrails AI up to 0.5.9 . It has been rated as very critical . This issue affects some unknown processing of the component XML Handler . The manipulation leads to improper neutralization of directives in dynamically evaluated code ('eval injection'). The identification of this vulnerability is CVE-2024-45858 . The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
CVE-2024-45858
An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a maliciously crafted XML file containing Python code, the code will be passed to an eval function, causing it to execute on the user's machine.
See 1 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI