Miggo Logo

CVE-2024-45851: MindsDB Eval Injection vulnerability

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.81272%
Published
9/12/2024
Updated
9/16/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
mindsdbpip>= 23.10.5.0, < 24.7.4.124.7.4.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsafe eval() usage in SharePoint integration handlers. The commit diff shows eval() was replaced with ast.literal_eval in these specific functions across sharepoint_api.py. These functions process user-controlled input from INSERT queries (CVE-2024-45851's attack vector) and directly passed untrusted data to eval(), enabling arbitrary code execution. The high confidence comes from: 1) Direct correlation between patched functions and vulnerability description 2) Explicit eval() usage shown in pre-patch code 3) Microsoft SharePoint context matching the advisory's scope 4) Multiple CWE-95 references confirming eval injection pattern.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n *r*itr*ry *o** *x**ution vuln*r**ility *xists in v*rsions **.**.*.* up to **.*.*.* o* t** Min*s** pl*t*orm, w**n t** Mi*roso*t S**r*Point int**r*tion is inst*ll** on t** s*rv*r. *or **t***s*s *r**t** wit* t** S**r*Point *n*in*, *n ‘INS*RT’ qu*ry *

Reasoning

T** vuln*r**ility st*ms *rom uns*** *v*l() us*** in S**r*Point int**r*tion **n*l*rs. T** *ommit *i** s*ows *v*l() w*s r*pl**** wit* *st.lit*r*l_*v*l in t**s* sp**i*i* *un*tions **ross s**r*point_*pi.py. T**s* *un*tions pro**ss us*r-*ontroll** input *
CVE-2024-45851: MindsDB SharePoint Eval Inj RCE | Miggo