漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Zero-Click Indirect Prompt Injection and Authentication Bypass via Email Polling
Vulnerability Description
nanobot is a personal AI assistant. Prior to version 0.1.6, an indirect prompt injection vulnerability exists in the email channel processing module (`nanobot/channels/email.py`), allowing a remote, unauthenticated attacker to execute arbitrary LLM instructions (and subsequently, system tools) without any interaction from the bot owner. By sending an email containing malicious prompts to the bot's monitored email address, the bot automatically polls, ingests, and processes the email content as highly trusted input, fully bypassing channel isolation and resulting in a stealthy, zero-click attack. Version 0.1.6 patches the issue.
CVSS Information
N/A
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
nanobot 安全漏洞
Vulnerability Description
nanobot是Data Intelligence Lab@HKU开源的一个轻量个人AI助手。 nanobot 0.1.6之前版本存在安全漏洞,该漏洞源于电子邮件通道处理模块存在间接提示注入,可能导致远程未经验证的攻击者执行任意LLM指令。
CVSS Information
N/A
Vulnerability Type
N/A