GHSA-wcjw-3v6p-4v3r

Suggest an improvement
Source
https://github.com/advisories/GHSA-wcjw-3v6p-4v3r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-wcjw-3v6p-4v3r/GHSA-wcjw-3v6p-4v3r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wcjw-3v6p-4v3r
Aliases
Published
2024-09-12T15:33:00Z
Modified
2024-09-16T22:06:24.743361Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
MindsDB Eval Injection vulnerability
Details

An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.

References

Affected packages

PyPI / mindsdb

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
23.10.3.0
Fixed
24.7.4.1

Affected versions

23.*

23.10.3.0
23.10.3.1
23.10.5.0
23.11.1.0
23.11.4.0
23.11.4.1
23.11.4.4a6
23.12.4.0
23.12.4.1
23.12.4.2

24.*

24.1.4.0
24.2.3.0
24.3.4.0
24.3.4.1
24.3.4.2
24.3.5.0
24.4.2.0
24.4.2.1
24.4.3.0
24.5.4.0
24.6.1.0
24.6.1.1
24.6.2.0
24.6.2.2
24.6.3.0
24.6.3.1
24.6.4.1
24.7.1.0
24.7.2.0
24.7.3.0
24.7.4.0