{"data":{"id":"9c602f14-d8ba-4837-9757-876fa4b25d47","title":"CVE-2024-52803: LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has bee","summary":"LLama Factory, a tool for fine-tuning large language models (AI systems trained on specific tasks or data), has a critical vulnerability that lets attackers run arbitrary commands on the computer running it. The flaw comes from unsafe handling of user input, specifically using a Python function called `Popen` with `shell=True` (a setting that interprets input as system commands) without checking or cleaning the input first.","solution":"This vulnerability is fixed in version 0.9.1.","labels":["security"],"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2024-52803","publishedAt":"2024-11-21T17:15:24.470Z","cveId":"CVE-2024-52803","cweIds":["CWE-79","CWE-78"],"cvssScore":"7.5","cvssSeverity":"high","severity":"high","attackType":["other"],"issueType":"vulnerability","affectedPackages":null,"affectedVendors":["HuggingFace"],"affectedVendorsRaw":["LLama Factory"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0.02414,"patchAvailable":null,"disclosureDate":null,"capecIds":["CAPEC-198","CAPEC-86","CAPEC-88"],"crossRefCount":0,"attackSophistication":"trivial","impactType":["confidentiality","integrity","availability"],"aiComponentTargeted":"training_data","llmSpecific":true,"classifierConfidence":0.95,"researchCategory":null,"atlasIds":null}}