CVE-2024-45854
📋 TL;DR
This vulnerability allows remote code execution on MindsDB servers through deserialization of untrusted data in uploaded models. Attackers can execute arbitrary code when a 'describe' query is run on a malicious 'inhouse' model. Organizations using MindsDB version 23.10.3.0 or newer are affected.
💻 Affected Systems
- MindsDB
📦 What is this software?
Mindsdb by Mindsdb
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, lateral movement, and persistent backdoor installation.
Likely Case
Unauthorized code execution allowing data exfiltration, service disruption, or cryptocurrency mining.
If Mitigated
Limited impact if proper network segmentation and least privilege are enforced.
🎯 Exploit Status
Exploitation requires authenticated access to upload models and run queries.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched version
Vendor Advisory: https://hiddenlayer.com/sai-security-advisory/2024-09-mindsdb/
Restart Required: Yes
Instructions:
1. Check current MindsDB version
2. Update to patched version per vendor instructions
3. Restart MindsDB service
4. Verify fix is applied
🔧 Temporary Workarounds
Restrict model uploads
allLimit who can upload 'inhouse' models to trusted users only
Disable 'describe' queries
allTemporarily disable 'describe' query functionality if not essential
🧯 If You Can't Patch
- Restrict network access to MindsDB instances
- Implement strict user access controls for model management
🔍 How to Verify
Check if Vulnerable:
Check if running MindsDB version 23.10.3.0 or newer and verify model upload permissions
Check Version:
mindsdb --version or check MindsDB web interface version
Verify Fix Applied:
Confirm version is updated to patched release and test model upload/describe functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual model uploads from unexpected users
- Multiple 'describe' query failures
- Suspicious process execution
Network Indicators:
- Outbound connections from MindsDB to unexpected destinations
- Unusual data exfiltration patterns
SIEM Query:
source='mindsdb' AND (event='model_upload' OR event='describe_query') | stats count by user, src_ip