{"uuid": "2013c57b-981f-472b-9f41-bbd384998ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45849", "type": "seen", "source": "https://t.me/cvedetector/5468", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45849 - MindsDB SharePoint Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45849 \nPublished : Sept. 12, 2024, 1:15 p.m. | 16\u00a0minutes ago \nDescription : An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of the MindsDB platform, when the Microsoft SharePoint integration is installed on the server. For databases created with the SharePoint engine, an \u2018INSERT\u2019 query can be used for list creation. If such a query is specially crafted to contain Python code and is run against the database, the code will be passed to an eval function and executed on the server. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T15:36:59.000000Z"}