An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Sep 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 |
Thu, 12 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mindsdb
Mindsdb mindsdb |
|
CPEs | cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mindsdb
Mindsdb mindsdb |
|
Metrics |
ssvc
|
Thu, 12 Sep 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server. | |
Weaknesses | CWE-95 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: HiddenLayer
Published: 2024-09-12T12:56:48.362Z
Updated: 2024-09-12T14:39:09.882Z
Reserved: 2024-09-10T15:36:52.125Z
Link: CVE-2024-45846
Vulnrichment
Updated: 2024-09-12T14:39:04.997Z
NVD
Status : Analyzed
Published: 2024-09-12T13:15:12.920
Modified: 2024-09-16T17:30:06.747
Link: CVE-2024-45846
Redhat
No data.