logo

CVE-2024-45847 mindsdb

Package

Manager: pip
Name: mindsdb
Vulnerable Version: >=23.11.4.2 <24.7.4.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01546 pctl0.80709

Details

MindsDB Eval Injection vulnerability An arbitrary code execution vulnerability exists in versions 23.11.4.2 up to 24.7.4.1 of the MindsDB platform, when one of several integrations is installed on the server. If a specially crafted ‘UPDATE’ query containing Python code is run against a database created with the specified integration engine, the code will be passed to an eval function and executed on the server.

Metadata

Created: 2024-09-12T15:33:00Z
Modified: 2024-09-16T21:11:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-crmg-rp64-5cm3/GHSA-crmg-rp64-5cm3.json
CWE IDs: ["CWE-94", "CWE-95"]
Alternative ID: GHSA-crmg-rp64-5cm3
Finding: F184
Auto approve: 1