mindsdb@23.10.3.1 vulnerabilities

MindsDB's AI SQL Server enables developers to build AI tools that need access to real-time data to perform their tasks

Direct Vulnerabilities

Known vulnerabilities in the mindsdb package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Cross-site Scripting (XSS)

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) whenever another user enumerates unsanitized items within the UI. An attacker can execute arbitrary JavaScript code by injecting malicious scripts into the input fields.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for MindsDB.

[0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the finetune method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server by uploading a maliciously crafted inhouse model and using it for finetuning.

Note: This can only occur if the BYOM engine is changed in the config from the default venv to inhouse.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.10.2.0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the predict method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server by uploading a malicious 'inhouse' model and using it for prediction.

Note: This can only occur if the BYOM engine is changed in the config from the default venv to inhouse.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.10.2.0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data within the describe method of the ModelWrapperUnsafe class in the mindsdb/integrations/handlers/byom_handler/byom_handler.py file, which will perform pickle.loads on a custom model built via the Build Your Own Model` process. An attacker can execute arbitrary code on the server by uploading a malicious 'inhouse' model and running a 'describe' query on it.

Note: This can only occur if the BYOM engine is changed in the config from the default ‘venv’ to ‘inhouse’.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.10.3.0,)
  • H
Deserialization of Untrusted Data

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Deserialization of Untrusted Data through the deserialization process within the decode function of the mindsdb/integrations/handlers/byom_handler/proc_wrapper.py file, which will perform a pickle.loads on a custom model built via the Build Your Own Model process. An attacker can execute arbitrary code on the server.

How to fix Deserialization of Untrusted Data?

There is no fixed version for MindsDB.

[23.3.2.0,)
  • H
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') due to an unprotected eval function inside the select function of the mindsdb/integrations/handlers/weaviate_handler/weaviate_handler.py file. An attacker can execute arbitrary code on the server by sending a specially crafted 'SELECT WHERE' clause containing Python code when using the Weaviate integration.

How to fix Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')?

Upgrade MindsDB to version 24.7.4.1 or higher.

[23.10.3.0,24.7.4.1)
  • H
Server-side Request Forgery (SSRF)

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the is_private_url function. An attacker can manipulate DNS responses to redirect traffic to malicious sites or local IP addresses by exploiting the DNS rebinding technique.

How to fix Server-side Request Forgery (SSRF)?

Upgrade MindsDB to version 23.12.4.2 or higher.

[,23.12.4.2)
  • M
Cross-site Scripting

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Cross-site Scripting due to improper sanitization of user-supplied input. An attacker can inject malicious scripts into web pages viewed by other users.

Note: This is true for both cloud version and OSS version.

How to fix Cross-site Scripting?

There is no fixed version for MindsDB.

[0,)
  • M
Files or Directories Accessible to External Parties

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties. An attacker can write arbitrary files to the system by exploiting insufficient validation of user-supplied input.

How to fix Files or Directories Accessible to External Parties?

Upgrade MindsDB to version 23.11.4.1 or higher.

[,23.11.4.1)
  • M
Server-side Request Forgery (SSRF)

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the put method in mindsdb/mindsdb/api/http/namespaces/file.py file. An attacker can disclose sensitive information and potentially interact with internal systems by sending crafted requests.

How to fix Server-side Request Forgery (SSRF)?

Upgrade MindsDB to version 23.11.4.0 or higher.

[,23.11.4.0)
  • M
Improper Input Validation

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Improper Input Validation due to insufficient validation of user-supplied input in the put method. An attacker can write files to arbitrary locations on the server by manipulating the name value, which is incorporated into the filename of a temporary file that is subsequently opened for writing.

How to fix Improper Input Validation?

Upgrade MindsDB to version 23.11.4.0 or higher.

[23.7.4.1,23.11.4.0)
  • H
Arbitrary File Write via Archive Extraction (Zip Slip)

MindsDB is a MindsDB server, provides server capabilities to mindsdb native python library

Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) due to an unsafe extraction which is performed using the shutil.unpack_archive() function from a remotely retrieved tarball. This can lead to the writing of the extracted files to an unintended location.

How to fix Arbitrary File Write via Archive Extraction (Zip Slip)?

There is no fixed version for MindsDB.

[0,)