An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1236 |
Thu, 12 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Refuel
Refuel autolabel |
|
| CPEs | cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Refuel
Refuel autolabel |
|
| Metrics |
ssvc
|
Thu, 12 Sep 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it. | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HiddenLayer
Published: 2024-09-12T12:50:47.730Z
Updated: 2024-09-12T14:47:11.915Z
Reserved: 2024-02-23T16:59:23.010Z
Link: CVE-2024-27321
Updated: 2024-09-12T14:47:06.986Z
Status : Analyzed
Published: 2024-09-12T13:15:12.267
Modified: 2024-09-20T17:06:58.440
Link: CVE-2024-27321
No data.