Vulnerability Description
Command injection when ingesting a remote Kaggle dataset due to a lack of input sanitization in the ingest_kaggle() API
CVSS Score
8.1
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Related Weaknesses (CWE)
References
- https://github.com/activeloopai/deeplake/pull/2876
- https://research.jfrog.com/vulnerabilities/deeplake-kaggle-command-injection-jfs
- https://github.com/activeloopai/deeplake/pull/2876
- https://research.jfrog.com/vulnerabilities/deeplake-kaggle-command-injection-jfs
FAQ
What is CVE-2024-6507?
CVE-2024-6507 is a vulnerability with a CVSS score of 8.1 (HIGH). Command injection when ingesting a remote Kaggle dataset due to a lack of input sanitization in the ingest_kaggle() API
How severe is CVE-2024-6507?
CVE-2024-6507 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6507?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.