GHSA-9rw2-jf8x-cgwm

Suggest an improvement
Source
https://github.com/advisories/GHSA-9rw2-jf8x-cgwm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-9rw2-jf8x-cgwm/GHSA-9rw2-jf8x-cgwm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9rw2-jf8x-cgwm
Aliases
  • CVE-2024-10073
Published
2024-10-17T18:31:36Z
Modified
2024-10-24T17:12:14.758636Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
Flair allows arbitrary code execution
Details

A vulnerability, which was classified as critical, was found in flairNLP flair 0.14.0. Affected is the function ClusteringModel of the file flair\models\clustering.py of the component Mode File Loader. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

PyPI / flair

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.14.0

Affected versions

0.*

0.1.1
0.2.1
0.3.0
0.3.1
0.3.2
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.5
0.5.1
0.6
0.6.0.post1
0.6.1
0.6.1.post1
0.7
0.8
0.8.0.post1
0.9
0.10
0.11
0.11.1
0.11.2
0.11.3
0.12
0.12.1
0.12.2
0.13.0
0.13.1
0.14.0