logo

CVE-2024-5452 lightning

Package

Manager: pip
Name: lightning
Vulnerable Version: >=0 <2.3.3

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.39909 pctl0.9723

Details

Remote code execution in pytorch lightning A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the `deepdiff` library. The library uses `deepdiff.Delta` objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.

Metadata

Created: 2024-06-06T18:30:58Z
Modified: 2024-10-16T18:32:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-cgwc-qvrx-rf7f/GHSA-cgwc-qvrx-rf7f.json
CWE IDs: ["CWE-913", "CWE-915"]
Alternative ID: GHSA-cgwc-qvrx-rf7f
Finding: F039
Auto approve: 1