Prompt Injection Leading to RCE in Manim Plugin
The `manim` plugin in the `gpt_academic` project is vulnerable to remote code execution (RCE) due to a prompt injection flaw. This vulnerability affects the main branch and has not yet been patched.
Available publicly on Jan 01 2025
Threat Overview
The vulnerability arises from the manim
plugin in the gpt_academic
project, which allows user-provided prompts to generate and execute untrusted code without proper sandboxing. This can lead to remote code execution (RCE) on the server running the application. The root cause is the lack of input validation and sandboxing when executing LLM-generated code, which allows an attacker to inject malicious code through crafted prompts.
Attack Scenario
An attacker can exploit this vulnerability by crafting a malicious prompt that includes code to be executed on the server. When the manim
plugin processes this prompt, it generates and executes the injected code, leading to the creation of a file on the server or other malicious actions. For example, an attacker can create a file named manim_pwned
on the server by including a specific command in the prompt.
Who is affected
Users and administrators of the gpt_academic
project who have the manim
plugin installed and are running the main branch are affected by this vulnerability.
Technical Report
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.