Safety vulnerability ID: 77977
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the LlamaIndex package are vulnerable to Remote Code Execution (RCE) through insecure deserialization. The `JsonPickleSerializer` class uses Python's `pickle.loads()` function without proper validation, which can execute arbitrary code when processing untrusted data.
The deserialize method attempts to deserialize data by applying `pickle.loads()` on base64-decoded input, allowing attackers to craft malicious payloads that execute arbitrary commands upon deserialization. A remote attacker can exploit this vulnerability by submitting specially crafted serialized objects, resulting in full system compromise.
The vulnerability was partially addressed by renaming the class to `PickleSerializer` and adding a prominent warning in the docstring advising users to only deserialize trusted data. However, the underlying insecure `pickle.loads()` functionality remains unchanged.
Latest version: 0.14.2
Interface between LLMs and your data
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application