Description
Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution.
Problem types
CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Product status
Any version before 2.3.24
cbf675521d4d2281925a051784a3b94172e56416 (git)
Credits
Eran Shimony, Palo Alto Networks
References
github.com/agno-agi/agno/releases/tag/v2.3.24
github.com/...ommit/cbf675521d4d2281925a051784a3b94172e56416
www.vulncheck.com/...eval-injection-arbitrary-code-execution