You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Learn more on MITRE.
Impact:
An RCE vulnerability has been identified in Microsoft Semantic Kernel Python SDK, specifically within the
InMemoryVectorStorefilter functionality.Patches:
The problem has been fixed in python-1.39.4. Users should upgrade this version or higher.
Workarounds:
Avoid using
InMemoryVectorStorefor production scenarios.References:
Release python-1.39.4 · microsoft/semantic-kernel · GitHub
PR to block use of dangerous attribute names that must not be accessed in filter expressions