CVE-2024-27321 Vulnerability Details

  /     /     /  

CVE-2024-27321 Metadata Quick Info

CVE Published: 12/09/2024 | CVE Updated: 12/09/2024 | CVE Year: 2024
Source: HiddenLayer | Vendor: Refuel | Product: autolabel
Status : PUBLISHED

CVE-2024-27321 Description

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.

Metrics

CVSS Version: 3.1 | Base Score: 7.8 HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* NONE
    User Interaction (UI)* REQUIRED
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-95
CWE Name: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ( Eval Injection )
Source: Refuel

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-35
CAPEC Description: CAPEC-35 Leverage Executable Code in Non-Executable Files


Source: NVD (National Vulnerability Database).