FastGPT Sandbox Vulnerable to Sandbox Bypass
Description
FastGPT is an open-source project that provides a platform for building, deploying, and operating AI-driven workflows and conversational agents. The Sandbox container (fastgpt-sandbox) is a specialized, isolated environment used by FastGPT to safely execute user-submitted or dynamically generated code in isolation. The sandbox before version 4.9.11 has insufficient isolation and inadequate restrictions on code execution by allowing overly permissive syscalls, which allows attackers to escape the intended sandbox boundaries. Attackers could exploit this to read and overwrite arbitrary files and bypass Python module import restrictions. This is patched in version 4.9.11 by restricting the allowed system calls to a safer subset and additional descriptive error messaging.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/labring/FastGPT/commit/bb810a43a1c70683fab7f5fe993771e930a94426mitrex_refsource_MISC
- github.com/labring/FastGPT/pull/4958mitrex_refsource_MISC
- github.com/labring/FastGPT/releases/tag/v4.9.11mitrex_refsource_MISC
- github.com/labring/FastGPT/security/advisories/GHSA-f3pf-r3g7-g895mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.