logo

CVE-2024-45846 mindsdb

Package

Manager: pip
Name: mindsdb
Vulnerable Version: >=23.10.3.0 <24.7.4.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01678 pctl0.81455

Details

MindsDB Eval Injection vulnerability An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.

Metadata

Created: 2024-09-12T15:33:00Z
Modified: 2024-09-16T21:57:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-wcjw-3v6p-4v3r/GHSA-wcjw-3v6p-4v3r.json
CWE IDs: ["CWE-94", "CWE-95"]
Alternative ID: GHSA-wcjw-3v6p-4v3r
Finding: F184
Auto approve: 1