CVE-2024-27320

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:refuel:autolabel:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-09-12 13:15

Updated : 2024-09-23 13:56


NVD link : CVE-2024-27320

Mitre link : CVE-2024-27320

CVE.ORG link : CVE-2024-27320


JSON object : View

Products Affected

refuel

  • autolabel
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-1236

Improper Neutralization of Formula Elements in a CSV File