Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Arbitrary Code Execution via Sandbox Bypass in the open source solution QnABot on AWS
Vulnerability Description
Improper use of the static-eval npm package in the open source solution qnabot-on-aws versions 7.2.4 and earlier may allow an authenticated administrator to execute arbitrary code within the fulfillment Lambda execution context by injecting a crafted conditional chaining expression via the Content Designer interface, which bypasses the intended expression sandbox through JavaScript prototype manipulation. This may grant direct access to backend resources (Lambda environment variables, OpenSearch indices, S3 objects, DynamoDB tables) that are not exposed through normal administrative interfaces. We recommend you upgrade to version 7.3.0 or above.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
aws-solutions QnABot on AWS 代码注入漏洞
Vulnerability Description
aws-solutions QnABot on AWS是aws-solutions公司的一个多语言聊天机器人。 aws-solutions QnABot on AWS 7.2.4及之前版本存在代码注入漏洞,该漏洞源于静态评估npm包使用不当,可能导致经过身份验证的管理员通过注入特制条件链表达式绕过沙箱,执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A