logo

CVE-2024-9701 kedro

Package

Manager: pip
Name: kedro
Vulnerable Version: >=0 <0.19.9

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00598 pctl0.6845

Details

Kedro deserialization vulnerability A Remote Code Execution (RCE) vulnerability has been identified in the Kedro ShelveStore class (version 0.19.8). This vulnerability allows an attacker to execute arbitrary Python code via deserialization of malicious payloads, potentially leading to a full system compromise. The ShelveStore class uses Python's shelve module to manage session data, which relies on pickle for serialization. Crafting a malicious payload and storing it in the shelve file can lead to RCE when the payload is deserialized.

Metadata

Created: 2025-03-20T12:32:51Z
Modified: 2025-03-21T03:38:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-747f-ww56-4q4h/GHSA-747f-ww56-4q4h.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-747f-ww56-4q4h
Finding: F096
Auto approve: 1