An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
History

Mon, 23 Sep 2024 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1236

Thu, 12 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Refuel
Refuel autolabel
CPEs cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:*
Vendors & Products Refuel
Refuel autolabel
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Sep 2024 13:15:00 +0000

Type Values Removed Values Added
Description An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
Weaknesses CWE-95
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HiddenLayer

Published: 2024-09-12T12:49:43.930Z

Updated: 2024-09-12T14:48:46.488Z

Reserved: 2024-02-23T16:59:23.010Z

Link: CVE-2024-27320

cve-icon Vulnrichment

Updated: 2024-09-12T14:48:41.316Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-12T13:15:11.987

Modified: 2024-09-23T13:56:48.353

Link: CVE-2024-27320

cve-icon Redhat

No data.