{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-45849","assignerOrgId":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","state":"PUBLISHED","assignerShortName":"HiddenLayer","dateReserved":"2024-09-10T15:36:52.126Z","datePublished":"2024-09-12T12:59:25.993Z","dateUpdated":"2024-09-12T14:02:51.572Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"mindsdb","repo":"https://github.com/mindsdb/mindsdb","vendor":"mindsdb","versions":[{"lessThan":"24.7.4.1","status":"affected","version":"23.10.5.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of the MindsDB platform, when the Microsoft SharePoint integration is installed on the server. For databases created with the SharePoint engine, an ‘INSERT’ query can be used for list creation. If such a query is specially crafted to contain Python code and is run against the database, the code will be passed to an eval function and executed on the server."}],"value":"An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of the MindsDB platform, when the Microsoft SharePoint integration is installed on the server. For databases created with the SharePoint engine, an ‘INSERT’ query can be used for list creation. If such a query is specially crafted to contain Python code and is run against the database, the code will be passed to an eval function and executed on the server."}],"impacts":[{"capecId":"CAPEC-35","descriptions":[{"lang":"en","value":"CAPEC-35 Leverage Executable Code in Non-Executable Files"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-95","description":"CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"6f8de1f0-f67e-45a6-b68f-98777fdb759c","shortName":"HiddenLayer","dateUpdated":"2024-09-12T12:59:25.993Z"},"references":[{"url":"https://hiddenlayer.com/sai-security-advisory/2024-09-mindsdb/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"mindsdb","product":"mindsdb","cpes":["cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"23.10.5.0","status":"affected","lessThan":"24.7.4.1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-12T14:01:54.454946Z","id":"CVE-2024-45849","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T14:02:51.572Z"}}]}}