CVE-2024-27320

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:*

History

23 Sep 2024, 13:56

Type Values Removed Values Added
CPE cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:*
CWE CWE-1236
First Time Refuel autolabel
Refuel
References () https://hiddenlayer.com/sai-security-advisory/2024-09-autolabel/ - () https://hiddenlayer.com/sai-security-advisory/2024-09-autolabel/ - Third Party Advisory

12 Sep 2024, 18:14

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-12 13:15

Updated : 2024-09-23 13:56


NVD link : CVE-2024-27320

Mitre link : CVE-2024-27320

CVE.ORG link : CVE-2024-27320


JSON object : View

Products Affected

refuel

  • autolabel
CWE
CWE-1236

Improper Neutralization of Formula Elements in a CSV File

CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')