This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical OS Command Injection flaw in PraisonAI. π **Consequences**: Attackers can inject arbitrary shell commands via user-controlled inputs, leading to full system compromise.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: **CWE-78** (OS Command Injection). The `execute_command` function and workflow shell execution expose user inputs directly to the shell without proper sanitization. β οΈ
Q3Who is affected? (Versions/Components)
π₯ **Affected**: **PraisonAI** by Mervin Praison. Specifically versions **before 4.5.121**. π¦ If you are running an older version, you are vulnerable.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Full **Remote Code Execution (RCE)**. Hackers gain the same privileges as the application user, allowing them to read, modify, or delete any data on the host system. π
Q5Is exploitation threshold high? (Auth/Config)
π **Exploitation Threshold**: **Low**. CVSS indicates **AV:N** (Network), **AC:L** (Low Complexity), **PR:N** (No Privileges Required). However, **UI:R** suggests User Interaction might be needed for specific triggers. π―
Q6Is there a public Exp? (PoC/Wild Exploitation)
π« **Public Exploit**: **No**. The `pocs` field is empty. No public Proof-of-Concept (PoC) or wild exploitation scripts are currently available. π΅οΈββοΈ
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Check your installed PraisonAI version. If it is **< 4.5.121**, you are at risk. Scan for usage of `execute_command` with unsanitized user input in your workflows. π§ͺ
Q8Is it fixed officially? (Patch/Mitigation)
β **Official Fix**: **Yes**. Patched in **v4.5.121**. π οΈ Upgrade immediately to the latest version to mitigate this vulnerability. See GitHub Advisory GHSA-2763-cj5r-c79m.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: If you cannot upgrade, **strictly sanitize** all inputs passed to `execute_command`. Avoid passing user-controlled strings directly to shell execution functions. π«
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **HIGH**. CVSS Score is **High** (C:H, I:H, A:H). Despite no public exploit, the ease of exploitation (Low AC) makes it a prime target. Patch NOW. β³