Vulnerability Description
LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises from improper handling of user input, allowing malicious actors to execute arbitrary OS commands on the host system. The issue is caused by insecure usage of the `Popen` function with `shell=True`, coupled with unsanitized user input. Immediate remediation is required to mitigate the risk. This vulnerability is fixed in 0.9.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hiyouga | Llama-Factory | < 0.9.1 |
Related Weaknesses (CWE)
References
- https://gist.github.com/superboy-zjc/f2d2b93ae511c445ba97e144b70e534dExploit
- https://github.com/hiyouga/LLaMA-Factory/commit/b3aa80d54a67da45e9e237e349486fb9Patch
- https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-hj3w-wrh4-44vpExploitVendor Advisory
FAQ
What is CVE-2024-52803?
CVE-2024-52803 is a vulnerability with a CVSS score of 7.5 (HIGH). LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises fr...
How severe is CVE-2024-52803?
CVE-2024-52803 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-52803?
Check the references section above for vendor advisories and patch information. Affected products include: Hiyouga Llama-Factory.