Súbít #420055: flairNLP flair v0.14.0 Code Injectionbayani

KuraflairNLP flair v0.14.0 Code Injection
GaskiyaA vulnerable function with command execution exists in the ClusteringModel class in flair.models. In the latest Release 0.14.0, flair\models\clustering.py declares a load function on line 72, and the official repository file TUTORIAL_12_CLUSTERING.md gives the usage of the ClusteringModel class, and I also used this paragraph demo code with node Loading/Saving the model, which triggers command execution when I load a malicious model data file without security validation via the built-in load function. I have placed the relevant malicious files, verification videos and PoC files in this repository.
Manga⚠️ https://github.com/bayuncao/vul-cve-20
Màdùmga
 runshen.gao (UID 75899)
Furta10/08/2024 13:39 (1 Shettima 전)
Gargajiya10/17/2024 09:40 (9 days later)
HalittaShingilam
VulDB gite280722 [flairNLP flair 0.14.0 Mode File Loader clustering.py ClusteringModel kura hakki ndiyam]
Nganji20

Do you need the next level of professionalism?

Upgrade your account now!