CVE-2024-45846

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-45846
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-45846.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-45846
Aliases
Published
2024-09-12T13:15:12Z
Modified
2025-02-19T03:38:48.561394Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.

References

Affected packages

Git / github.com/mindsdb/mindsdb

Affected ranges

Type
GIT
Repo
https://github.com/mindsdb/mindsdb
Events

Affected versions

v23.*

v23.10.3.0
v23.10.3.1
v23.10.5.0
v23.11.1.0
v23.11.28.1-alpha
v23.11.4.0
v23.11.4.1
v23.11.4.2
v23.11.4.3-alpha
v23.11.4.3-alpha2
v23.11.4.3-alpha3
v23.11.4.4a1
v23.11.4.4a2
v23.11.4.4a3
v23.11.4.4a4
v23.11.4.4a5
v23.11.4.4a6
v23.12.4.0
v23.12.4.1
v23.12.4.2

v24.*

v24.1.4.0
v24.2.3.0
v24.3.4.0
v24.3.4.1
v24.3.4.2
v24.3.5.0
v24.4.2.0
v24.5.4.0
v24.6.1.0
v24.6.1.1
v24.6.2.0
v24.6.2.2
v24.6.3.0
v24.6.3.1
v24.6.4.0
v24.6.4.1
v24.7.1.0
v24.7.2.0
v24.7.3.0
v24.7.4.0