logo

CVE-2023-49796 mindsdb

Package

Manager: pip
Name: mindsdb
Vulnerable Version: >=0 <23.11.4.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00664 pctl0.70323

Details

Improper Input Validation in mindsdb ### Impact The put method in `mindsdb/mindsdb/api/http/namespaces/file.py` does not validate the user-controlled `name` value, which is used in a temporary file name, which is afterwards opened for writing on lines 122-125, which leads to path injection. This issue may lead to arbitrary file write. This vulnerability allows for writing files anywhere on the server that the filesystem permissions that the running server has access to. ### Patches Use mindsdb staging branch or v23.11.4.1 ### References * GHSL-2023-184 * See [CodeQL path injection prevention guidelines](https://codeql.github.com/codeql-query-help/python/py-path-injection/) and [OWASP guidelines](https://owasp.org/www-community/attacks/Path_Traversal).

Metadata

Created: 2023-12-12T00:49:00Z
Modified: 2024-11-22T18:14:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-crhp-7c74-cg4c/GHSA-crhp-7c74-cg4c.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-crhp-7c74-cg4c
Finding: F184
Auto approve: 1