CVE-2024-9701 – kedro
Package
Manager: pip
Name: kedro
Vulnerable Version: >=0 <0.19.9
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00598 pctl0.6845
Details
Kedro deserialization vulnerability A Remote Code Execution (RCE) vulnerability has been identified in the Kedro ShelveStore class (version 0.19.8). This vulnerability allows an attacker to execute arbitrary Python code via deserialization of malicious payloads, potentially leading to a full system compromise. The ShelveStore class uses Python's shelve module to manage session data, which relies on pickle for serialization. Crafting a malicious payload and storing it in the shelve file can lead to RCE when the payload is deserialized.
Metadata
Created: 2025-03-20T12:32:51Z
Modified: 2025-03-21T03:38:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-747f-ww56-4q4h/GHSA-747f-ww56-4q4h.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-747f-ww56-4q4h
Finding: F096
Auto approve: 1