{"vulnerability": "CVE-2024-21576", "sightings": [{"uuid": "b734a65c-1aa6-4ac9-908b-6eaf23ed244f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21576", "type": "seen", "source": "https://t.me/cvedetector/12867", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21576 - ComfyUI Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-21576 \nPublished : Dec. 13, 2024, 12:15 p.m. | 44\u00a0minutes ago \nDescription : ComfyUI-Bmad-Nodes is vulnerable to Code Injection. The issue stems from a validation bypass in the BuildColorRangeHSVAdvanced, FilterContour and FindContour custom nodes. In the entrypoint function to each node, there\u2019s a call to eval which can be triggered by generating a workflow that injects a crafted string into the node. This can result in executing arbitrary code on the server. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T14:06:06.000000Z"}, {"uuid": "c122ba05-9fd3-42b5-a23d-655c84a7eeb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21576", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645259921618026", "content": "", "creation_timestamp": "2024-12-13T11:24:09.591488Z"}]}