An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Sep 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1236 |
Thu, 12 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Refuel
Refuel autolabel |
|
| CPEs | cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Refuel
Refuel autolabel |
|
| Metrics |
ssvc
|
Thu, 12 Sep 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it. | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HiddenLayer
Published: 2024-09-12T12:49:43.930Z
Updated: 2024-09-12T14:48:46.488Z
Reserved: 2024-02-23T16:59:23.010Z
Link: CVE-2024-27320
Updated: 2024-09-12T14:48:41.316Z
Status : Analyzed
Published: 2024-09-12T13:15:11.987
Modified: 2024-09-23T13:56:48.353
Link: CVE-2024-27320
No data.