
Cloud Vulnerability DB
A community-led vulnerabilities database
A deserialization vulnerability exists in MindsDB platform versions 23.10.3.0 and newer, identified as CVE-2024-45854. The vulnerability is present within the describe method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which performs unsafe deserialization of untrusted data when loading custom models (HiddenLayer Advisory).
The vulnerability occurs when the BYOM engine is configured to 'inhouse' instead of the default 'venv' setting. When a describe query is run on a model, the code is passed to the vulnerable describe method of the ModelWrapperUnsafe class, which calls pickle.loads on the model without proper validation. The vulnerability has been assigned a CVSS v3.1 score of 7.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H and is categorized as CWE-502: Deserialization of Untrusted Data (NVD).
When exploited, this vulnerability allows an authenticated attacker to execute arbitrary code on the server when a 'describe' query is run on a maliciously crafted model. The impact is severe as it could lead to complete system compromise with high confidentiality, integrity, and availability impacts (HiddenLayer Advisory).
The vendor has implemented updates to address this vulnerability in version v24.7.4.1, released on July 23, 2024. The fix includes replacing the use of 'eval' with 'ast.literal_eval' in certain parts of the codebase (HiddenLayer Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."