Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nMm04LWYzeDItcXByd84AA_ff

Refuel Autolab Eval Injection vulnerability

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.

Permalink: https://github.com/advisories/GHSA-g2m8-f3x2-qprw
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nMm04LWYzeDItcXByd84AA_ff
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 2 months ago
Updated: 2 months ago


CVSS Score: 7.8
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Identifiers: GHSA-g2m8-f3x2-qprw, CVE-2024-27320
References: Repository: https://github.com/refuel-ai/autolabel
Blast Radius: 0.0

Affected Packages

pypi:refuel-autolabel
Dependent packages: 0
Dependent repositories: 1
Downloads: 962 last month
Affected Version Ranges: >= 0.0.8, <= 0.0.16
No known fixed version
All affected versions: 0.0.8, 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.0.13, 0.0.14, 0.0.15, 0.0.16