2024-02-06 17:00:42 +00:00
{
"id" : "CVE-2024-24590" ,
"sourceIdentifier" : "6f8de1f0-f67e-45a6-b68f-98777fdb759c" ,
"published" : "2024-02-06T15:15:09.100" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:59:28.480" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-02-06 17:00:42 +00:00
"descriptions" : [
{
"lang" : "en" ,
2024-02-13 21:00:28 +00:00
"value" : "Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI\u2019s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user\u2019s system when interacted with.\n"
} ,
{
"lang" : "es" ,
"value" : "La deserializaci\u00f3n de datos que no son de confianza puede ocurrir en la versi\u00f3n 0.17.0 o posterior de la plataforma ClearML de Allegro AI, lo que permite que un artefacto cargado maliciosamente ejecute c\u00f3digo arbitrario en el sistema de un usuario final cuando interact\u00faa con \u00e9l."
2024-02-06 17:00:42 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-02-15 17:00:34 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "6f8de1f0-f67e-45a6-b68f-98777fdb759c" ,
"type" : "Secondary" ,
2024-02-15 17:00:34 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.0 ,
"baseSeverity" : "HIGH" ,
2024-02-15 17:00:34 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
2024-12-08 03:06:42 +00:00
"privilegesRequired" : "LOW" ,
2024-02-15 17:00:34 +00:00
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-02-15 17:00:34 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.1 ,
2024-02-15 17:00:34 +00:00
"impactScore" : 5.9
} ,
2024-02-06 17:00:42 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-02-06 17:00:42 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2024-02-06 17:00:42 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
2024-12-08 03:06:42 +00:00
"privilegesRequired" : "NONE" ,
2024-02-06 17:00:42 +00:00
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-02-06 17:00:42 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.8 ,
2024-02-06 17:00:42 +00:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-02-15 17:00:34 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "6f8de1f0-f67e-45a6-b68f-98777fdb759c" ,
"type" : "Secondary" ,
2024-02-15 17:00:34 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-502"
}
]
} ,
2024-02-06 17:00:42 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-02-06 17:00:42 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-502"
}
]
}
] ,
2024-02-15 17:00:34 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clear:clearml:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "0.17.0" ,
"versionEndIncluding" : "1.14.2" ,
"matchCriteriaId" : "E6977435-CDE5-4CE8-B6CA-A302E5841FF2"
}
]
}
]
}
] ,
2024-02-06 17:00:42 +00:00
"references" : [
{
"url" : "https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/" ,
2024-02-15 17:00:34 +00:00
"source" : "6f8de1f0-f67e-45a6-b68f-98777fdb759c" ,
"tags" : [
"Exploit" ,
"Technical Description" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Technical Description" ,
"Third Party Advisory"
]
2024-02-06 17:00:42 +00:00
}
]
}