Lucene search

K
vulnrichmentHiddenLayerVULNRICHMENT:CVE-2024-27321
HistorySep 12, 2024 - 12:50 p.m.

CVE-2024-27321

2024-09-1212:50:47
CWE-95
HiddenLayer
github.com
1
arbitrary code execution
refuel autolabel
multilabel classification
csv files
python code

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

22.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:*"
    ],
    "vendor": "refuel",
    "product": "autolabel",
    "versions": [
      {
        "status": "affected",
        "version": "0.0.8",
        "versionType": "semver",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

22.3%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-27321