mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
90 lines
6.7 KiB
JSON
90 lines
6.7 KiB
JSON
{
|
|
"id": "CVE-2024-48918",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-10-16T21:15:13.650",
|
|
"lastModified": "2024-10-18T12:53:04.627",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "RDS Light is a simplified version of the Reflective Dialogue System (RDS), a self-reflecting AI framework. Versions prior to 1.1.0 contain a vulnerability that involves a lack of input validation within the RDS AI framework, specifically within the user input handling code in the main module (`main.py`). This leaves the framework open to injection attacks and potential memory tampering. Any user or external actor providing input to the system could exploit this vulnerability to inject malicious commands, corrupt stored data, or affect API calls. This is particularly critical for users employing RDS AI in production environments where it interacts with sensitive systems, performs dynamic memory caching, or retrieves user-specific data for analysis. Impacted areas include developers using the RDS AI system as a backend for AI-driven applications and systems running RDS AI that may be exposed to untrusted environments or receive unverified user inputs. The vulnerability has been patched in version 1.1.0 of the RDS AI framework. All user inputs are now sanitized and validated against a set of rules designed to mitigate malicious content. Users should upgrade to version 1.1.0 or higher and ensure all dependencies are updated to their latest versions. For users unable to upgrade to the patched version, a workaround can be implemented. The user implementing the workaround should implement custom validation checks for user inputs to filter out unsafe characters and patterns (e.g., SQL injection attempts, script injections) and limit or remove features that allow user input until the system can be patched."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "RDS Light es una versi\u00f3n simplificada del Reflective Dialogue System (RDS), un framework de trabajo de IA autorreflexivo. Las versiones anteriores a la 1.1.0 contienen una vulnerabilidad que implica una falta de validaci\u00f3n de entrada dentro del framework de trabajo de IA de RDS, espec\u00edficamente dentro del c\u00f3digo de manejo de entrada del usuario en el m\u00f3dulo principal (`main.py`). Esto deja al framework abierto a ataques de inyecci\u00f3n y posible manipulaci\u00f3n de la memoria. Cualquier usuario o actor externo que proporcione informaci\u00f3n al sistema podr\u00eda explotar esta vulnerabilidad para inyectar comandos maliciosos, corromper datos almacenados o afectar las llamadas de API. Esto es particularmente cr\u00edtico para los usuarios que emplean RDS AI en entornos de producci\u00f3n donde interact\u00faa con sistemas sensibles, realiza almacenamiento en cach\u00e9 de memoria din\u00e1mica o recupera datos espec\u00edficos del usuario para su an\u00e1lisis. Las \u00e1reas afectadas incluyen desarrolladores que utilizan el sistema de IA de RDS como backend para aplicaciones impulsadas por IA y sistemas que ejecutan RDS AI que pueden estar expuestos a entornos no confiables o recibir entradas de usuario no verificadas. La vulnerabilidad ha sido corregida en la versi\u00f3n 1.1.0 del framework de trabajo de IA de RDS. Ahora, todas las entradas de los usuarios se desinfectan y validan con un conjunto de reglas dise\u00f1adas para mitigar el contenido malicioso. Los usuarios deben actualizar a la versi\u00f3n 1.1.0 o superior y asegurarse de que todas las dependencias est\u00e9n actualizadas a sus \u00faltimas versiones. Para los usuarios que no puedan actualizar a la versi\u00f3n parcheada, se puede implementar una soluci\u00f3n alternativa. El usuario que implemente la soluci\u00f3n alternativa debe implementar verificaciones de validaci\u00f3n personalizadas para las entradas de los usuarios a fin de filtrar caracteres y patrones no seguros (por ejemplo, intentos de inyecci\u00f3n SQL, inyecciones de scripts) y limitar o eliminar las funciones que permiten la entrada de datos por parte del usuario hasta que se pueda aplicar el parche al sistema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV40": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "4.0",
|
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"attackRequirements": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"vulnerableSystemConfidentiality": "HIGH",
|
|
"vulnerableSystemIntegrity": "HIGH",
|
|
"vulnerableSystemAvailability": "HIGH",
|
|
"subsequentSystemConfidentiality": "NONE",
|
|
"subsequentSystemIntegrity": "NONE",
|
|
"subsequentSystemAvailability": "NONE",
|
|
"exploitMaturity": "UNREPORTED",
|
|
"confidentialityRequirements": "NOT_DEFINED",
|
|
"integrityRequirements": "NOT_DEFINED",
|
|
"availabilityRequirements": "NOT_DEFINED",
|
|
"modifiedAttackVector": "NOT_DEFINED",
|
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
|
"modifiedUserInteraction": "NOT_DEFINED",
|
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
|
"safety": "NOT_DEFINED",
|
|
"automatable": "NOT_DEFINED",
|
|
"recovery": "NOT_DEFINED",
|
|
"valueDensity": "NOT_DEFINED",
|
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
|
"providerUrgency": "NOT_DEFINED",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH"
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-74"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/RDSaiPlatforms/RDSlight/commit/7dac0e214a344447a2a8ea7414188c38c6a61a6e",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/RDSaiPlatforms/RDSlight/security/advisories/GHSA-5f6w-8mqh-hv2g",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |