Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Docker escape in Auto-GPT when running from docker-compose.yml included in git repo
Vulnerability Description
Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. Running Auto-GPT version prior to 0.4.3 by cloning the git repo and executing `docker compose run auto-gpt` in the repo root uses a different docker-compose.yml file from the one suggested in the official docker set up instructions. The docker-compose.yml file located in the repo root mounts itself into the docker container without write protection. This means that if malicious custom python code is executed via the `execute_python_file` and `execute_python_code` commands, it can overwrite the docker-compose.yml file and abuse it to gain control of the host system the next time Auto-GPT is started. The issue has been patched in version 0.4.3.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
Auto-GPT 代码注入漏洞
Vulnerability Description
Auto-GPT是Significant Gravitas开源的一个人工智能软件代理程序。 Auto-GPT 0.4.3之前版本存在代码注入漏洞,该漏洞源于位于存储库根目录中的 docker-compose.yml 文件将自身安装到 docker 容器中,且没有写保护,如果通过和命令执行恶意自定义 python 代码,它可以覆盖 docker-compose.yml 文件并在下次 Auto-GPT 启动时来获得对主机系统的控制。
CVSS Information
N/A
Vulnerability Type
N/A