icon

We found results for “

CVE-2024-27321

Good to know:

icon

Date: September 12, 2024

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Formula Elements in a CSV File

CWE-1236

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-95

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us