Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2786 | An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it. |
Github GHSA |
GHSA-g2m8-f3x2-qprw | Refuel Autolab Eval Injection vulnerability |
Mon, 23 Sep 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1236 |
Thu, 12 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Refuel
Refuel autolabel |
|
| CPEs | cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Refuel
Refuel autolabel |
|
| Metrics |
ssvc
|
Thu, 12 Sep 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it. | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HiddenLayer
Published:
Updated: 2024-09-12T14:48:46.488Z
Reserved: 2024-02-23T16:59:23.010Z
Link: CVE-2024-27320
Updated: 2024-09-12T14:48:41.316Z
Status : Analyzed
Published: 2024-09-12T13:15:11.987
Modified: 2024-09-23T13:56:48.353
Link: CVE-2024-27320
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA