MindsDB@24.8.3.0 vulnerabilities

MindsDB's AI SQL Server enables developers to build AI tools that need access to real-time data to perform their tasks

Direct Vulnerabilities

Known vulnerabilities in the MindsDB package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Cross-site Scripting (XSS)

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) whenever another user enumerates unsanitized items within the UI. An attacker can execute arbitrary JavaScript code by injecting malicious scripts into the input fields.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for MindsDB.

[0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the finetune method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server by uploading a maliciously crafted inhouse model and using it for finetuning.

Note: This can only occur if the BYOM engine is changed in the config from the default venv to inhouse.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.10.2.0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the predict method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server by uploading a malicious 'inhouse' model and using it for prediction.

Note: This can only occur if the BYOM engine is changed in the config from the default venv to inhouse.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.10.2.0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the describe method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model` process. An attacker can execute arbitrary code on the server by uploading a malicious 'inhouse' model and running a 'describe' query on it.

Note: This can only occur if the BYOM engine is changed in the config from the default ‘venv’ to ‘inhouse’.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.10.3.0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data through the deserialization process within the decode function of the mindsdb/integrations/handlers/byom_handler/proc_wrapper.py file, which will perform a pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.3.2.0,)
  • M
Cross-site Scripting

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Cross-site Scripting due to improper sanitization of user-supplied input. An attacker can inject malicious scripts into web pages viewed by other users.

Note: This is true for both cloud version and OSS version.

How to fix Cross-site Scripting?

There is no fixed version for MindsDB.

[0,)
  • H
Arbitrary File Write via Archive Extraction (Zip Slip)

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) due to an unsafe extraction which is performed using the shutil.unpack_archive() function from a remotely retrieved tarball. This can lead to the writing of the extracted files to an unintended location.

How to fix Arbitrary File Write via Archive Extraction (Zip Slip)?

There is no fixed version for MindsDB.

[0,)