Arbitrary Code Execution Vulnerability in Weaviate
CVE-2024-45846

8.8HIGH

Key Information:

Vendor

Mindsdb

Status
Vendor
CVE Published:
12 September 2024

What is CVE-2024-45846?

A vulnerability exists in the MindsDB platform specifically when the Weaviate integration is utilized. It allows for arbitrary code execution due to improper handling of user input. An attacker can exploit this by executing specially crafted 'SELECT WHERE' SQL clauses that contain Python code. When this malicious code is processed, it gets passed to the eval function on the server, resulting in the execution of arbitrary commands. This can potentially give attackers unauthorized access to sensitive information and control over the affected server environment.

Affected Version(s)

mindsdb 23.10.3.0 < 24.7.4.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.