A vulnerability in the `default_jsonalyzer` function of the `JSONalyzeQueryEngine` in the run-llama/llama_index repository allows for SQL injection via prompt injection. This can lead to arbitrary...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| llama-index | pip | < 0.12.3 | 0.12.3 |
| llamaindex | pip | — | No patch |
Severity & Risk
Recommended Action
Patch available
Update llama-index to version 0.12.3
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
A vulnerability in the `default_jsonalyzer` function of the `JSONalyzeQueryEngine` in the run-llama/llama_index repository allows for SQL injection via prompt injection. This can lead to arbitrary file creation and Denial-of-Service (DoS) attacks. The vulnerability affects the latest version and is fixed in version 0.5.1.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H References
- github.com/advisories/GHSA-jmgm-gx32-vp4w
- github.com/run-llama/llama_index/commit/bf282074e20e7dafd5e2066137dcd4cd17c3fb9e
- huntr.com/bounties/095f9e67-311d-494c-99c5-5e61a0adb8f3
- nvd.nist.gov/vuln/detail/CVE-2024-12911
- github.com/run-llama/llama_index/commit/bf282074e20e7dafd5e2066137dcd4cd17c3fb9e Patch
- huntr.com/bounties/095f9e67-311d-494c-99c5-5e61a0adb8f3 Exploit 3rd Party