MindsDB Eval Injection vulnerability
High severity
GitHub Reviewed
Published
Sep 12, 2024
to the GitHub Advisory Database
•
Updated Sep 16, 2024
Description
Published by the National Vulnerability Database
Sep 12, 2024
Published to the GitHub Advisory Database
Sep 12, 2024
Reviewed
Sep 12, 2024
Last updated
Sep 16, 2024
An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.
References