CVE-2023-49796 – MindsDB Arbitrary File Write vulnerability
https://notcve.org/view.php?id=CVE-2023-49796
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a limited file write vulnerability in `file.py` Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue. MindsDB conecta modelos de inteligencia artificial con datos en tiempo real. Las versiones anteriores a la 23.11.4.1 contienen una vulnerabilidad de escritura de archivos limitada en `file.py`. Los usuarios deben usar la rama `staging` de MindsDB o la versión 23.11.4.1, que contiene una solución para el problema. • https://github.com/mindsdb/mindsdb/commit/8d13c9c28ebcf3b36509eb679378004d4648d8fe https://github.com/mindsdb/mindsdb/security/advisories/GHSA-crhp-7c74-cg4c • CWE-20: Improper Input Validation •
CVE-2023-49795 – MindsDB Server-Side Request Forgery vulnerability
https://notcve.org/view.php?id=CVE-2023-49795
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a server-side request forgery vulnerability in `file.py`. This can lead to limited information disclosure. Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue. MindsDB conecta modelos de inteligencia artificial con datos en tiempo real. • https://github.com/mindsdb/mindsdb/commit/8d13c9c28ebcf3b36509eb679378004d4648d8fe https://github.com/mindsdb/mindsdb/security/advisories/GHSA-34mr-6q8x-g9r6 • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2023-38699 – MindsDB 'Call to requests with verify=False disabling SSL certificate checks, security issue.' issue
https://notcve.org/view.php?id=CVE-2023-38699
MindsDB's AI Virtual Database allows developers to connect any AI/ML model to any datasource. Prior to version 23.7.4.0, a call to requests with `verify=False` disables SSL certificate checks. This rule enforces always verifying SSL certificates for methods in the Requests library. In version 23.7.4.0, certificates are validated by default, which is the desired behavior. AI Virtual Database de MindsDB permite a los desarrolladores conectar cualquier modelo AI/ML a cualquier fuente de datos. • https://github.com/mindsdb/mindsdb/commit/083afcf6567cf51aa7d89ea892fd97689919053b https://github.com/mindsdb/mindsdb/releases/tag/v23.7.4.0 https://github.com/mindsdb/mindsdb/security/advisories/GHSA-8hx6-qv6f-xgcw • CWE-311: Missing Encryption of Sensitive Data •
CVE-2023-30620 – Arbitrary File Write when Extracting a Remotely retrieved Tarball in mindsdb/mindsdb
https://notcve.org/view.php?id=CVE-2023-30620
mindsdb is a Machine Learning platform to help developers build AI solutions. In affected versions an unsafe extraction is being performed using `tarfile.extractall()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. Sometimes, the vulnerability is called a TarSlip or a ZipSlip variant. An attacker may leverage this vulnerability to overwrite any local file which the server process has access to. • https://github.com/mindsdb/mindsdb/commit/4419b0f0019c000db390b54d8b9d06e1d3670039 https://github.com/mindsdb/mindsdb/releases/tag/v23.2.1.0 https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-23522 – Arbitrary File Write when Extracting Tarballs retrieved from a remote location using in mindsdb
https://notcve.org/view.php?id=CVE-2022-23522
MindsDB is an open source machine learning platform. An unsafe extraction is being performed using `shutil.unpack_archive()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. This vulnerability is sometimes called a **TarSlip** or a **ZipSlip variant**. Unpacking files using the high-level function `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path remained within the intended destination directory may cause files to be overwritten outside the destination directory. • https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •