Home » Database

AVID-2026-R1535

Description

Vulnerability CVE-2024-45851

Details

An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of the MindsDB platform, when the Microsoft SharePoint integration is installed on the server. For databases created with the SharePoint engine, an ‘INSERT’ query can be used for list item creation. If such a query is specially crafted to contain Python code and is run against the database, the code will be passed to an eval function and executed on the server.

Reason for inclusion in AVID: CVE-2024-45851 describes an arbitrary code execution vulnerability in the MindsDB platform, triggered by crafted data via an INSERT query that executes Python code on the server. MindsDB is an AI/ML platform used to build and serve models, and the vulnerability affects the AI software stack, including deployment and runtime components. This constitutes a software supply chain vulnerability within AI system pipelines (model serving/AI data processing components) and poses a direct security risk (RCE).

References

Affected or Relevant Artifacts

  • Developer: mindsdb
  • Deployer: mindsdb
  • Artifact Details:
TypeName
Systemmindsdb

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-95CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-09-12
  • Version: 0.3.3
  • AVID Entry