VAITP Dataset

Dataset Statistics
Search for CVE
#
CVE
Vulnerability
ODC
Category
Subcategory
Accessibility Scope
Details
Total vulnerabilities in the dataset (not showing ignored and non-python related vulnerabilties): 1438
1145
CVE-2024-45847
Arbitrary code execution in MindsDB via crafted UPDATE queries.

An arbitrary code execution vulnerability exists in versions 23.11.4.2 up to 24.7.4.1 of the MindsDB platform, when one of several integrations is installed on the server. If a specially crafted โ€˜UPDATEโ€™ query containing Python code is run against a database created with the specified integration engine, the code will be passed to an eval function and executed on the server.

Function
Input Validation and Sanitization
SQL Injection
Remote
1144
CVE-2024-41129
Ops library exposes secrets via CLI args, affecting Juju charm security.

The ops library is a Python framework for developing and testing Kubernetes and machine charms. The issue here is that ops passes the secret content as one of the args via CLI. This issue may affect any of the charms that are using: Juju (>=3.0), Juju secrets and not correctly capturing and processing `subprocess.CalledProcessError`. This vulnerability is fixed in 2.15.0.

Interface
Information Leakage
Insecure Handling of Sensitive Data
Local
1142
CVE-2024-28102
Denial of service via malicious JWE Token causing high resource consumption.

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

Algorithm
Resource Management
Resource Exhaustion
Remote
1141
CVE-2024-47833
Session cookies lack Secure and HTTPOnly flags in affected Taipy versions.

Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Interface
Authentication, Authorization, and Session Management
Session Management Issues
Remote
1140
CVE-2024-27320
Arbitrary code execution in Refuel Autolabel via malicious CSV files.

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its classification tasks handle provided CSV files. If a victim user creates a classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
1139
CVE-2024-27321
Arbitrary code execution in Refuel Autolabel via malicious CSV files.

An arbitrary code execution vulnerability exists in versions 0.0.8 and newer of the Refuel Autolabel library because of the way its multilabel classification tasks handle provided CSV files. If a user creates a multilabel classification task using a maliciously crafted CSV file containing Python code, the code will be passed to an eval function which executes it.

Function
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
1138
CVE-2024-45858
Arbitrary code execution via malicious XML file in Guardrails framework.

An arbitrary code execution vulnerability exists in versions 0.2.9 up to 0.5.10 of the Guardrails AI Guardrails framework because of the way it validates XML files. If a victim user loads a maliciously crafted XML file containing Python code, the code will be passed to an eval function, causing it to execute on the user's machine.

Checking
Input Validation and Sanitization
Insecure Parsing or Deserialization
Remote
1137
CVE-2024-45848
Arbitrary code execution in MindsDB with crafted INSERT queries.

An arbitrary code execution vulnerability exists in versions 23.12.4.0 up to 24.7.4.1 of the MindsDB platform, when the ChromaDB integration is installed on the server. If a specially crafted โ€˜INSERTโ€™ query containing Python code is run against a database created with the ChromaDB engine, the code will be passed to an eval function and executed on the server.

Function
Input Validation and Sanitization
SQL Injection
Remote
1136
CVE-2024-45846
Arbitrary code execution in MindsDB with Weaviate integration via SQL.

An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of the MindsDB platform, when the Weaviate integration is installed on the server. If a specially crafted โ€˜SELECT WHEREโ€™ clause containing Python code is run against a database created with the Weaviate engine, the code will be passed to an eval function and executed on the server.

Function
Input Validation and Sanitization
Command Injection
Remote
1135
CVE-2024-5565
Prompt injection in Vanna library allows remote code execution.

The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the libraryโ€™s โ€œaskโ€ method with "visualize" set to True (default behavior) leads to remote code execution.

Function
Input Validation and Sanitization
Command Injection
Remote
Introducing the "VAITP dataset": a specialized repository of Python vulnerabilities and patches, meticulously compiled for the use of the security research community. As Python's prominence grows, understanding and addressing potential security vulnerabilities become crucial. Crafted by and for the cybersecurity community, this dataset offers a valuable resource for researchers, analysts, and developers to analyze and mitigate the security risks associated with Python. Through the comprehensive exploration of vulnerabilities and corresponding patches, the VAITP dataset fosters a safer and more resilient Python ecosystem, encouraging collaborative advancements in programming security.

The supreme art of war is to subdue the enemy without fighting.

Sun Tzu – “The Art of War”

:: Shaping the future through research and ingenuity ::