THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-5452

RCE via Property/Class Pollution in lightning-ai/pytorch-lightning

Assigner@huntr_ai
Reserved2024-05-28
Published2024-06-06
Updated2024-06-06

Description

A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the `deepdiff` library. The library uses `deepdiff.Delta` objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.



CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

Any version
affected

References

https://huntr.com/bounties/486add92-275e-4a7b-92f9-42d84bc759da

cve.org CVE-2024-5452

nvd.nist.gov CVE-2024-5452

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5452
© Copyright 2024 THREATINT. Made in Cyprus with +