We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-5452

RCE via Property/Class Pollution in lightning-ai/pytorch-lightning



Assigner@huntr_ai
Reserved2024-05-28
Published2024-06-06
Updated2024-08-09

Description

A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the `deepdiff` library. The library uses `deepdiff.Delta` objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.



CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Any version
affected

References

https://huntr.com/bounties/486add92-275e-4a7b-92f9-42d84bc759da

cve.org CVE-2024-5452

nvd.nist.gov CVE-2024-5452

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5452
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.