Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nMm04LWYzeDItcXByd84AA_ff
Refuel Autolab Eval Injection vulnerability
An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
Permalink: https://github.com/advisories/GHSA-g2m8-f3x2-qprwJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nMm04LWYzeDItcXByd84AA_ff
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 2 months ago
Updated: 2 months ago
CVSS Score: 7.8
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-g2m8-f3x2-qprw, CVE-2024-27320
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-27320
- https://hiddenlayer.com/sai-security-advisory/2024-09-autolabel
- https://github.com/refuel-ai/autolabel/blob/v0.0.16/src/autolabel/dataset/validation.py#L57-L79
- https://github.com/advisories/GHSA-g2m8-f3x2-qprw
Blast Radius: 0.0
Affected Packages
pypi:refuel-autolabel
Dependent packages: 0Dependent repositories: 1
Downloads: 962 last month
Affected Version Ranges: >= 0.0.8, <= 0.0.16
No known fixed version
All affected versions: 0.0.8, 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.0.13, 0.0.14, 0.0.15, 0.0.16