CVE-2024-27320

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution in Refuel Autolabel library when processing malicious CSV files. Attackers can execute arbitrary Python code by crafting CSV files that get passed to eval() during classification tasks. Users of Autolabel versions 0.0.8 and newer who process untrusted CSV files are affected.

💻 Affected Systems

Products:
  • Refuel Autolabel
Versions: 0.0.8 and newer
Operating Systems: All platforms running Python
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when using classification tasks with CSV file processing. All installations using affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, install malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Data theft, system manipulation, or deployment of ransomware/cryptominers on affected systems.

🟢

If Mitigated

Limited impact if only trusted CSV files are processed and proper input validation is implemented.

🌐 Internet-Facing: HIGH if classification tasks accept CSV uploads from external users.
🏢 Internal Only: MEDIUM if only internal users can upload CSV files, but still significant due to potential insider threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires victim to process a malicious CSV file. Public advisory includes technical details making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for latest patched version

Vendor Advisory: https://hiddenlayer.com/sai-security-advisory/2024-09-autolabel/

Restart Required: No

Instructions:

1. Check current Autolabel version. 2. Update to latest patched version via pip: pip install --upgrade autolabel. 3. Verify no vulnerable code remains in deployment.

🔧 Temporary Workarounds

Disable CSV file processing

all

Temporarily disable classification tasks that accept CSV files until patched.

Implement CSV validation

all

Add strict validation to reject CSV files containing Python code patterns.

🧯 If You Can't Patch

  • Restrict CSV file uploads to trusted sources only
  • Implement network segmentation to isolate Autolabel instances from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check Autolabel version: python -c "import autolabel; print(autolabel.__version__)". If version >= 0.0.8, system is vulnerable.

Check Version:

python -c "import autolabel; print(autolabel.__version__)"

Verify Fix Applied:

Verify version is updated beyond vulnerable range and test with safe CSV files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Python execution errors
  • CSV processing failures with eval-related errors
  • Unexpected system commands in logs

Network Indicators:

  • Unexpected outbound connections from Autolabel instances
  • Data exfiltration patterns

SIEM Query:

source="autolabel.log" AND ("eval" OR "exec" OR "code injection")

🔗 References

📤 Share & Export