Arbitrary code execution vulnerability in Refuel Autolabel library
CVE-2024-27321
7.8HIGH
Key Information:
- Vendor
- Refuel
- Status
- Autolabel
- Vendor
- CVE Published:
- 12 September 2024
Summary
An arbitrary code execution vulnerability in the Refuel Autolabel library arises due to improper handling of multilabel classification tasks associated with maliciously crafted CSV files. Users who create tasks using these compromised files can inadvertently pass Python code to an eval function, resulting in unintended execution of that code. As this vulnerability affects all versions starting from 0.0.8, users are urged to review their applications and implement necessary security measures to mitigate risks posed by this flaw.
Affected Version(s)
autolabel 0.0.8
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database