PYSEC-2024-77

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/mindsdb/PYSEC-2024-77.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2024-77
Aliases
Published
2024-09-12T13:15:00Z
Modified
2024-09-16T19:42:29.239495Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.

References

Affected packages

PyPI / mindsdb

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
23.10.3.0
Fixed
24.7.4.1

Affected versions

23.*

23.10.3.0
23.10.3.1
23.10.5.0
23.11.1.0
23.11.4.0
23.11.4.1
23.11.4.4a6
23.12.4.0
23.12.4.1
23.12.4.2

24.*

24.1.4.0
24.2.3.0
24.3.4.0
24.3.4.1
24.3.4.2
24.3.5.0
24.4.2.0
24.4.2.1
24.4.3.0
24.5.4.0
24.6.1.0
24.6.1.1
24.6.2.0
24.6.2.2
24.6.3.0
24.6.3.1
24.6.4.1
24.7.1.0
24.7.2.0
24.7.3.0
24.7.4.0