An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2709 An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
Github GHSA Github GHSA GHSA-4fgp-7vvm-m4jf Refuel Autolab Eval Injection vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1236

Thu, 12 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Refuel
Refuel autolabel
CPEs cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:*
Vendors & Products Refuel
Refuel autolabel
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Sep 2024 13:15:00 +0000

Type Values Removed Values Added
Description An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
Weaknesses CWE-95
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HiddenLayer

Published:

Updated: 2024-09-12T14:47:11.915Z

Reserved: 2024-02-23T16:59:23.010Z

Link: CVE-2024-27321

cve-icon Vulnrichment

Updated: 2024-09-12T14:47:06.986Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-12T13:15:12.267

Modified: 2024-09-20T17:06:58.440

Link: CVE-2024-27321

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.