CVE-2024-5452

Scores

EPSS

0.567medium56.7%
0%20%40%60%80%100%

Percentile: 56.7%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the deepdiff library. The library uses deepdiff.Delta objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-915

Exploits

Exploit ID: CVE-2024-5452

Source: github-poc

URL: https://github.com/skrkcb2/CVE-2024-5452

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: pytorch_lightning

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:lightningai:pytorch_lightning:*:*:*:*:*:python:*:*",      "versionEndExcluding": "2.3.3",      "vulnerable": true    }  ],  "operator": "OR"...

Source: nvd

End of list