Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A rapid injection flaw in Vanna AI exposes databases to RCE attacks
Global Security

A rapid injection flaw in Vanna AI exposes databases to RCE attacks

AdminBy AdminJuly 8, 2024No Comments4 Mins Read
Prompt Injection Flaw
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Fast injection error

Cybersecurity researchers have discovered a serious security flaw in the Vanna.AI library that could be exploited to achieve a remote code execution vulnerability using brute force injection techniques.

The vulnerability, tracked as CVE-2024-5565 (CVSS score: 8.1), relates to an exploit in the “ask” function that can be used to force a library to execute arbitrary commands, according to supply chain security firm JFrog said.

Vanna is based on Python machine learning library which allows users to communicate with their SQL database to obtain information by “just asking questions” (aka prompts) that are translated into an equivalent SQL query using a large language model (LLM).

The rapid proliferation of generative artificial intelligence (AI) models in recent years has brought to the fore the risk of exploitation by malicious actors who can weaponize the tools by providing adversarial inputs to bypass their built-in security mechanisms.

One such known class of attack is quick injectionwhich refers to the type Jailbreak AI which may be used to bypass fences set up by LLM providers to prevent the production of offensive, harmful or illegal content, or to execute instructions that defeat the intended purpose of the application.

Cyber ​​security

Such attacks can be indirect, where the system processes data controlled by a third party (such as incoming emails or editable documents) to launch a malicious payload that jailbreaks the AI.

They can also take the form of a so-called a multiple escapes from prison or the multi-turn jailbreak (aka Crescendo), in which the operator “starts an innocuous dialogue and gradually steers the conversation toward an intended, forbidden goal.”

This approach can be extended further to implement another new jailbreak attack known as Skeleton Key.

“This AI jailbreak method works by using a multi-turn (or multi-step) strategy to force the model to ignore its fences,” Mark Russinovich, CTO of Microsoft Azure, said. “By ignoring the fence, the model will not be able to detect malicious or unauthorized requests from others.”

Skeleton Key also differs from Crescendo in that, after a successful jailbreak and system rule change, the model can generate answers to questions that would otherwise be forbidden, regardless of ethical and security risks.

“If the Skeleton Key jailbreak is successful, the model recognizes that it has updated its guidelines and will subsequently follow the instructions to create any content, regardless of how much it violates the original responsible AI guidelines,” Rusinovich said.

Fast injection error

“Unlike other jailbreaks like Crescendo, where models have to request tasks indirectly or via coding, Skeleton Key puts models in a mode where the user can request tasks directly. Additionally, the model’s output appears completely unfiltered and shows the model’s degree of knowledge or ability to produce the requested content.”

JFrog’s latest findings – too independently disclosed Tong Liu – show how immediate injections can have serious consequences, especially when they are linked to command execution.

CVE-2024-5565 exploits the fact that Vanna facilitates the generation of text in SQL to create SQL queries that are then executed and graphically presented to the user using the Plotly graphics library.

This is achieved by using an ask function. – for example, vn.ask(“What are the 10 customers with the most sales?”) is one of the main API endpoints that allows you to generate SQL queries against the database.

Cyber ​​security

The above behavior, combined with Plotly’s dynamic code generation, creates a security hole that allows a threat actor to send a specially crafted prompt with a command embedded to be executed on the host system.

“The Vanna library uses a hint function to present rendered results to the user, it is possible to change the hint with a quick injection and run arbitrary Python code instead of the intended rendering code,” JFrog said.

“Specifically, allowing external input to the library’s “ask” method with “render” to True (the default behavior) results in remote code execution.”

After responsible disclosure, Vanna released a tempering guide which warns users that the Plotly integration can be used to generate arbitrary Python code and that users who expose this feature should do so in a sandboxed environment.

“This discovery demonstrates that the risks of widespread use of GenAI/LLM without proper governance and security can have dramatic consequences for organizations,” Shachar Menashe, senior director of security research at JFrog, said in a statement.

“The dangers of rapid injection are not yet well known, but they are easy to perform. Companies should not rely on advance hints as a foolproof protection mechanism and should use more robust mechanisms when LLM interacts with mission-critical resources such as databases or dynamic code generation.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.