CVE-2024-45846

Source
https://cve.org/CVERecord?id=CVE-2024-45846
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45846.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-45846
Aliases
Published
2024-09-12T13:15:12.920Z
Modified
2026-04-09T10:23:25.216438Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted ‘SELECT WHERE’ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.

References

Affected packages

Git / github.com/mindsdb/mindsdb

Affected ranges

Type
GIT
Repo
https://github.com/mindsdb/mindsdb
Events
Database specific
{
    "versions": [
        {
            "introduced": "23.10.3.0"
        },
        {
            "fixed": "24.7.4.1"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45846.json"