All the vulnerabilites related to hiyouga - LLaMA-Factory
cve-2025-46567
Vulnerability from cvelistv5
Published
2025-05-01 17:20
Modified
2025-05-02 17:29
Severity ?
EPSS score ?
Summary
LLaMA-Factory Allows Arbitrary Code Execution via Unsafe Deserialization in Ilamafy_baichuan2.py
References
▼ | URL | Tags |
---|---|---|
https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv | x_refsource_CONFIRM | |
https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
hiyouga | LLaMA-Factory |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-46567", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-02T17:29:42.693942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-02T17:29:45.664Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "LLaMA-Factory", "vendor": "hiyouga", "versions": [ { "status": "affected", "version": "\u003c 1.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "LLama Factory enables fine-tuning of large language models. Prior to version 1.0.0, a critical vulnerability exists in the `llamafy_baichuan2.py` script of the LLaMA-Factory project. The script performs insecure deserialization using `torch.load()` on user-supplied `.bin` files from an input directory. An attacker can exploit this behavior by crafting a malicious `.bin` file that executes arbitrary commands during deserialization. This issue has been patched in version 1.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502: Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-01T17:20:41.020Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv" }, { "name": "https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a" } ], "source": { "advisory": "GHSA-f2f7-gj54-6vpv", "discovery": "UNKNOWN" }, "title": "LLaMA-Factory Allows Arbitrary Code Execution via Unsafe Deserialization in Ilamafy_baichuan2.py" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-46567", "datePublished": "2025-05-01T17:20:41.020Z", "dateReserved": "2025-04-24T21:10:48.175Z", "dateUpdated": "2025-05-02T17:29:45.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52803
Vulnerability from cvelistv5
Published
2024-11-21 16:53
Modified
2024-11-21 21:12
Severity ?
EPSS score ?
Summary
LLama Factory Remote OS Command Injection Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-hj3w-wrh4-44vp | x_refsource_CONFIRM | |
https://github.com/hiyouga/LLaMA-Factory/commit/b3aa80d54a67da45e9e237e349486fb9c162b2ac | x_refsource_MISC | |
https://gist.github.com/superboy-zjc/f2d2b93ae511c445ba97e144b70e534d | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
hiyouga | LLaMA-Factory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:llama-factory:llama-factory:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "llama-factory", "vendor": "llama-factory", "versions": [ { "lessThan": "0.9.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-52803", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T21:05:38.878255Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T21:12:06.172Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "LLaMA-Factory", "vendor": "hiyouga", "versions": [ { "status": "affected", "version": "\u003c 0.9.1" } ] } ], "descriptions": [ { "lang": "en", "value": "LLama Factory enables fine-tuning of large language models. A critical remote OS command injection vulnerability has been identified in the LLama Factory training process. This vulnerability arises from improper handling of user input, allowing malicious actors to execute arbitrary OS commands on the host system. The issue is caused by insecure usage of the `Popen` function with `shell=True`, coupled with unsanitized user input. Immediate remediation is required to mitigate the risk. This vulnerability is fixed in 0.9.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-21T16:53:18.398Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-hj3w-wrh4-44vp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-hj3w-wrh4-44vp" }, { "name": "https://github.com/hiyouga/LLaMA-Factory/commit/b3aa80d54a67da45e9e237e349486fb9c162b2ac", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/hiyouga/LLaMA-Factory/commit/b3aa80d54a67da45e9e237e349486fb9c162b2ac" }, { "name": "https://gist.github.com/superboy-zjc/f2d2b93ae511c445ba97e144b70e534d", "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/superboy-zjc/f2d2b93ae511c445ba97e144b70e534d" } ], "source": { "advisory": "GHSA-hj3w-wrh4-44vp", "discovery": "UNKNOWN" }, "title": "LLama Factory Remote OS Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52803", "datePublished": "2024-11-21T16:53:18.398Z", "dateReserved": "2024-11-15T17:11:13.441Z", "dateUpdated": "2024-11-21T21:12:06.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }