Arbitrary code execution vulnerability in Refuel Autolabel library
CVE-2024-27321

7.8HIGH

Key Information:

Vendor
Refuel
Status
Autolabel
Vendor
CVE Published:
12 September 2024

Summary

An arbitrary code execution vulnerability in the Refuel Autolabel library arises due to improper handling of multilabel classification tasks associated with maliciously crafted CSV files. Users who create tasks using these compromised files can inadvertently pass Python code to an eval function, resulting in unintended execution of that code. As this vulnerability affects all versions starting from 0.0.8, users are urged to review their applications and implement necessary security measures to mitigate risks posed by this flaw.

Affected Version(s)

autolabel 0.0.8

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.