CVE-2024-48050: AgentScope uses `eval`
(updated )
In agentscope <=v0.0.4, the file agentscope\web\workstation\workflow_utils.py
has the function is_callable_expression
. Within this function, the line result = eval(s)
poses a security risk as it can directly execute user-provided commands.
References
- gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d
- github.com/advisories/GHSA-6p55-qr3j-mpgq
- github.com/modelscope/agentscope
- github.com/modelscope/agentscope/blob/main/src/agentscope/web/workstation/workflow_utils.py
- nvd.nist.gov/vuln/detail/CVE-2024-48050
- rumbling-slice-eb0.notion.site/Unauthenticated-Remote-Code-Execution-via-The-use-of-eval-in-is_callable_expression-and-sanitize_nod-cd4ea6c576da4e0b965ef596855c298d
Detect and mitigate CVE-2024-48050 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →