Skip to content

Conversation

@mzfr
Copy link

@mzfr mzfr commented Oct 19, 2025

Fixes #733

@giacomo-doyensec
Copy link
Collaborator

Hello @mzfr, please provide a dockerized testbed containing both a vulnerable and a safe version of the software along with a README.md file containing deployment instructions and vulnerability reproduction steps on https://github.com/google/security-testbeds

@mzfr
Copy link
Author

mzfr commented Jan 14, 2026

Hi @giacomo-doyensec @tooryx I apologize for the delayed response but I've created a testbed for this. Please let me know if something needs to be changed

@giacomo-doyensec
Copy link
Collaborator

Hello @mzfr, I can see that the detector is missing a fingerprint phase.
I'm also not able to get a successful detection running the plugin against the provided testbed, the last request that should detect the RCE returns the following body showing a failed run.

INFO: Sending request: HttpRequest{method=GET, url=http://host.docker.internal:7860/queue/data?session_hash=tsunami1768486864679, headers=HttpHeaders{rawHeaders={Accept=[text/event-stream]}}, requestBody=Optional.empty}

Jan 15, 2026 2:21:04 PM com.google.tsunami.plugins.detectors.templateddetector.actions.HttpActionRunner run
INFO: Request body: 
Jan 15, 2026 2:21:04 PM com.google.tsunami.common.net.http.OkHttpHttpClient send
INFO: Sending HTTP 'GET' request to 'http://host.docker.internal:7860/queue/data?session_hash=tsunami1768486864679'.
Jan 15, 2026 2:21:04 PM com.google.tsunami.common.net.http.OkHttpHttpClient parseResponse
INFO: Received HTTP response with code '200' for request to 'http://host.docker.internal:7860/queue/data?session_hash=tsunami1768486864679'.
Jan 15, 2026 2:21:07 PM com.google.tsunami.plugins.detectors.templateddetector.actions.HttpActionRunner run
INFO: Received response: HttpResponse{status=Ok, headers=HttpHeaders{rawHeaders={Date=[Thu, 15 Jan 2026 14:21:04 GMT], Server=[uvicorn], Content-Type=[text/event-stream; charset=utf-8], Transfer-Encoding=[chunked]}}, bodyBytes=Optional[<ByteString@2d5da930 size=1391 contents="data: 
{\"msg\":\"estimation\",\"event_id\":\"5179f79dc...">], responseUrl=Optional[http://host.docker.internal:7860/queue/data?session_hash=tsunami1768486864679]}
Jan 15, 2026 2:21:07 PM com.google.tsunami.plugins.detectors.templateddetector.actions.HttpActionRunner run
INFO: Response body: data: {"msg":"estimation","event_id":"5179f79dc4b945adaf688839cf71942e","rank":0,"queue_size":1,"rank_eta":3.1320821046829224}

data: {"msg":"process_starts","event_id":"5179f79dc4b945adaf688839cf71942e","eta":3.1320821046829224}

data: {"msg":"log","event_id":"5179f79dc4b945adaf688839cf71942e","log":"CUDA environment was not detected.","level":"warning"}

data: {"msg":"process_generating","event_id":"5179f79dc4b945adaf688839cf71942e","output":{"data":["",{"visible":false,"__type__":"update"},{"__type__":"update"}],"is_generating":true,"duration":0.008702754974365234,"average_duration":0.6941403283013238},"success":true}

data: {"msg":"process_generating","event_id":"5179f79dc4b945adaf688839cf71942e","output":{"data":[[],[],[]],"is_generating":true,"duration":2.0026605129241943,"average_duration":0.8249923467636109},"success":true}

data: {"msg":"process_generating","event_id":"5179f79dc4b945adaf688839cf71942e","output":{"data":[[["append",[],"Failed."]],[],[]],"is_generating":true,"duration":0.7313852310180664,"average_duration":0.8164826089685614},"success":true}

data: {"msg":"process_completed","event_id":"5179f79dc4b945adaf688839cf71942e","output":{"data":["Failed.",{"visible":false,"__type__":"update"},{"__type__":"update"}],"is_generating":false,"duration":0.0003266334533691406,"average_duration":0.748469611008962},"success":true}

data: {"msg":"close_stream"}

Let me know if you need help in debugging this or if you have any question going forward.
Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

PRP: LLaMA-Factory CVE-2024-52803 OS Command Injection / Remote Code Execution

3 participants