LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| llamafactory | pip | <= 0.9.0 | 0.9.1 |
| llama-factory | — | — | No patch |
Severity & Risk
Recommended Action
Patch available
Update llamafactory to version 0.9.1
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises from improper handling of user input, allowing malicious actors to execute arbitrary OS commands on the host system. The issue is caused by insecure usage of the `Popen` function with `shell=True`, coupled with unsanitized user input. Immediate remediation is required to mitigate the risk. This vulnerability is fixed in 0.9.1.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- gist.github.com/superboy-zjc/f2d2b93ae511c445ba97e144b70e534d
- github.com/advisories/GHSA-hj3w-wrh4-44vp
- github.com/hiyouga/LLaMA-Factory/commit/b3aa80d54a67da45e9e237e349486fb9c162b2ac
- github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-hj3w-wrh4-44vp
- nvd.nist.gov/vuln/detail/CVE-2024-52803
- gist.github.com/superboy-zjc/f2d2b93ae511c445ba97e144b70e534d Exploit
- github.com/hiyouga/LLaMA-Factory/commit/b3aa80d54a67da45e9e237e349486fb9c162b2ac Patch
- github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-hj3w-wrh4-44vp Exploit Vendor