漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Docker escape in Auto-GPT when running from docker-compose.yml included in git repo
Vulnerability Description
Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. Running Auto-GPT version prior to 0.4.3 by cloning the git repo and executing `docker compose run auto-gpt` in the repo root uses a different docker-compose.yml file from the one suggested in the official docker set up instructions. The docker-compose.yml file located in the repo root mounts itself into the docker container without write protection. This means that if malicious custom python code is executed via the `execute_python_file` and `execute_python_code` commands, it can overwrite the docker-compose.yml file and abuse it to gain control of the host system the next time Auto-GPT is started. The issue has been patched in version 0.4.3.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
Auto-GPT 代码注入漏洞
Vulnerability Description
Auto-GPT是Significant Gravitas开源的一个人工智能软件代理程序。 Auto-GPT 0.4.3之前版本存在代码注入漏洞,该漏洞源于位于存储库根目录中的 docker-compose.yml 文件将自身安装到 docker 容器中,且没有写保护,如果通过和命令执行恶意自定义 python 代码,它可以覆盖 docker-compose.yml 文件并在下次 Auto-GPT 启动时来获得对主机系统的控制。
CVSS Information
N/A
Vulnerability Type
N/A