{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-45847","assignerOrgId":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","state":"PUBLISHED","assignerShortName":"HiddenLayer","dateReserved":"2024-09-10T15:36:52.125Z","datePublished":"2024-09-12T12:57:42.357Z","dateUpdated":"2024-09-12T14:37:32.950Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"mindsdb","repo":"https://github.com/mindsdb/mindsdb","vendor":"mindsdb","versions":[{"lessThan":"24.7.4.1","status":"affected","version":"23.11.4.2","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An arbitrary code execution vulnerability exists in versions 23.11.4.2 up to 24.7.4.1 of the MindsDB platform, when one of several integrations is installed on the server. If a specially crafted ‘UPDATE’ query containing Python code is run against a database created with the specified integration engine, the code will be passed to an eval function and executed on the server."}],"value":"An arbitrary code execution vulnerability exists in versions 23.11.4.2 up to 24.7.4.1 of the MindsDB platform, when one of several integrations is installed on the server. If a specially crafted ‘UPDATE’ query containing Python code is run against a database created with the specified integration engine, the code will be passed to an eval function and executed on the server."}],"impacts":[{"capecId":"CAPEC-35","descriptions":[{"lang":"en","value":"CAPEC-35 Leverage Executable Code in Non-Executable Files"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-95","description":"CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","shortName":"HiddenLayer","dateUpdated":"2024-09-12T12:57:42.357Z"},"references":[{"url":"https://hiddenlayer.com/sai-security-advisory/2024-09-mindsdb/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"mindsdb","product":"mindsdb","cpes":["cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"23.11.4.2","status":"affected","lessThan":"24.7.4.1","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-12T14:36:33.344700Z","id":"CVE-2024-45847","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T14:37:32.950Z"}}]}}