MindsDB@24.11.4.0 vulnerabilities

MindsDB's AI SQL Server enables developers to build AI tools that need access to real-time data to perform their tasks

  • latest version

    24.12.4.0

  • first published

    6 years ago

  • latest version published

    3 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the MindsDB package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Cross-site Scripting (XSS)

    MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) whenever another user enumerates unsanitized items within the UI. An attacker can execute arbitrary JavaScript code by injecting malicious scripts into the input fields.

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for MindsDB.

    [0,)
    • H
    Deserialization of Untrusted Data

    MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the finetune method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server by uploading a maliciously crafted inhouse model and using it for finetuning.

    Note: This can only occur if the BYOM engine is changed in the config from the default venv to inhouse.

    How to fix Deserialization of Untrusted Data?

    There is no fixed version for MindsDB.

    [23.10.2.0,)
    • H
    Deserialization of Untrusted Data

    MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the predict method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server by uploading a malicious 'inhouse' model and using it for prediction.

    Note: This can only occur if the BYOM engine is changed in the config from the default venv to inhouse.

    How to fix Deserialization of Untrusted Data?

    There is no fixed version for MindsDB.

    [23.10.2.0,)
    • H
    Deserialization of Untrusted Data

    MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the describe method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model` process. An attacker can execute arbitrary code on the server by uploading a malicious 'inhouse' model and running a 'describe' query on it.

    Note: This can only occur if the BYOM engine is changed in the config from the default ‘venv’ to ‘inhouse’.

    How to fix Deserialization of Untrusted Data?

    There is no fixed version for MindsDB.

    [23.10.3.0,)
    • H
    Deserialization of Untrusted Data

    MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data through the deserialization process within the decode function of the mindsdb/integrations/handlers/byom_handler/proc_wrapper.py file, which will perform a pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server.

    How to fix Deserialization of Untrusted Data?

    There is no fixed version for MindsDB.

    [23.3.2.0,)
    • H
    Arbitrary File Write via Archive Extraction (Zip Slip)

    MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

    Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) due to an unsafe extraction which is performed using the shutil.unpack_archive() function from a remotely retrieved tarball. This can lead to the writing of the extracted files to an unintended location.

    How to fix Arbitrary File Write via Archive Extraction (Zip Slip)?

    There is no fixed version for MindsDB.

    [0,)