Local File Read via Prompt Injection
A vulnerability in the `devika` project using Google Gimini 1.0 Pro allows for local file read via prompt injection. The affected version is the main branch as of May 2nd, 2024, commit cdfb782b0e634b773b10963c8034dc9207ba1f9f. The issue has not yet been patched.
Available publicly on Aug 04 2024
CVE:
CVE-2024-6331CWE:
74:InjectionCVSS:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Credit:
zpbrentRemediation Steps
- Update the safety settings in
devika
to useHarmBlockThreshold.BLOCK_LOW_AND_ABOVE
forHarmCategory.HARM_CATEGORY_HATE_SPEECH
andHarmCategory.HARM_CATEGORY_HARASSMENT
. - Review and sanitize user inputs to prevent prompt injection.
- Regularly update dependencies and apply security patches.
- Monitor logs for any suspicious activity that may indicate exploitation attempts.
Patch Details
- Fixed Version: N/A
- Patch Commit: N/A
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.