| Kura | flairNLP flair v0.14.0 Code Injection |
|---|
| Gaskiya | A vulnerable function with command execution exists in the ClusteringModel class in flair.models.
In the latest Release 0.14.0, flair\models\clustering.py declares a load function on line 72, and the official repository file TUTORIAL_12_CLUSTERING.md gives the usage of the ClusteringModel class, and I also used this paragraph demo code with node Loading/Saving the model, which triggers command execution when I load a malicious model data file without security validation via the built-in load function.
I have placed the relevant malicious files, verification videos and PoC files in this repository. |
|---|
| Manga | ⚠️ https://github.com/bayuncao/vul-cve-20 |
|---|
| Màdùmga | runshen.gao (UID 75899) |
|---|
| Furta | 10/08/2024 13:39 (1 Shettima 전) |
|---|
| Gargajiya | 10/17/2024 09:40 (9 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 280722 [flairNLP flair 0.14.0 Mode File Loader clustering.py ClusteringModel kura hakki ndiyam] |
|---|
| Nganji | 20 |
|---|