CVE-2024-45857 (GCVE-0-2024-45857)
Vulnerability from cvelistv5 – Published: 2024-09-12 12:53 – Updated: 2024-09-12 14:43
VLAI?
Summary
Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user’s system when the data directory is loaded.
Severity ?
7.8 (High)
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cleanlab:cleanlab:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "cleanlab",
"vendor": "cleanlab",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "2.4",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-45857",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-12T14:41:32.414893Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-12T14:43:45.118Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "cleanlab",
"repo": "https://github.com/cleanlab/cleanlab",
"vendor": "Cleanlab",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "2.4.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user\u2019s system when the data directory is loaded."
}
],
"value": "Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user\u2019s system when the data directory is loaded."
}
],
"impacts": [
{
"capecId": "CAPEC-586",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-586 Object Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-12T12:53:43.963Z",
"orgId": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"shortName": "HiddenLayer"
},
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/2024-09-cleanlab/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"assignerShortName": "HiddenLayer",
"cveId": "CVE-2024-45857",
"datePublished": "2024-09-12T12:53:43.963Z",
"dateReserved": "2024-09-10T15:36:55.926Z",
"dateUpdated": "2024-09-12T14:43:45.118Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user\\u2019s system when the data directory is loaded.\"}, {\"lang\": \"es\", \"value\": \"La deserializaci\\u00f3n de datos no confiables puede ocurrir en las versiones 2.4.0 o m\\u00e1s recientes del proyecto Cleanlab, lo que permite que un archivo datalab.pkl manipulado con fines malintencionados ejecute c\\u00f3digo arbitrario en el sistema de un usuario final cuando se carga el directorio de datos.\"}]",
"id": "CVE-2024-45857",
"lastModified": "2024-09-12T18:14:03.913",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"6f8de1f0-f67e-45a6-b68f-98777fdb759c\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2024-09-12T13:15:16.227",
"references": "[{\"url\": \"https://hiddenlayer.com/sai-security-advisory/2024-09-cleanlab/\", \"source\": \"6f8de1f0-f67e-45a6-b68f-98777fdb759c\"}]",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"6f8de1f0-f67e-45a6-b68f-98777fdb759c\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-502\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-45857\",\"sourceIdentifier\":\"6f8de1f0-f67e-45a6-b68f-98777fdb759c\",\"published\":\"2024-09-12T13:15:16.227\",\"lastModified\":\"2024-09-12T18:14:03.913\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user\u2019s system when the data directory is loaded.\"},{\"lang\":\"es\",\"value\":\"La deserializaci\u00f3n de datos no confiables puede ocurrir en las versiones 2.4.0 o m\u00e1s recientes del proyecto Cleanlab, lo que permite que un archivo datalab.pkl manipulado con fines malintencionados ejecute c\u00f3digo arbitrario en el sistema de un usuario final cuando se carga el directorio de datos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"6f8de1f0-f67e-45a6-b68f-98777fdb759c\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"6f8de1f0-f67e-45a6-b68f-98777fdb759c\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"references\":[{\"url\":\"https://hiddenlayer.com/sai-security-advisory/2024-09-cleanlab/\",\"source\":\"6f8de1f0-f67e-45a6-b68f-98777fdb759c\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"cleanlab\", \"repo\": \"https://github.com/cleanlab/cleanlab\", \"vendor\": \"Cleanlab\", \"versions\": [{\"lessThanOrEqual\": \"*\", \"status\": \"affected\", \"version\": \"2.4.0\", \"versionType\": \"semver\"}]}], \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user\\u2019s system when the data directory is loaded.\"}], \"value\": \"Deserialization of untrusted data can occur in versions 2.4.0 or newer of the Cleanlab project, enabling a maliciously crafted datalab.pkl file to run arbitrary code on an end user\\u2019s system when the data directory is loaded.\"}], \"impacts\": [{\"capecId\": \"CAPEC-586\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-586 Object Injection\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"LOCAL\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-502\", \"description\": \"CWE-502 Deserialization of Untrusted Data\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"6f8de1f0-f67e-45a6-b68f-98777fdb759c\", \"shortName\": \"HiddenLayer\", \"dateUpdated\": \"2024-09-12T12:53:43.963Z\"}, \"references\": [{\"url\": \"https://hiddenlayer.com/sai-security-advisory/2024-09-cleanlab/\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45857\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-12T14:41:32.414893Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cleanlab:cleanlab:*:*:*:*:*:*:*:*\"], \"vendor\": \"cleanlab\", \"product\": \"cleanlab\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-12T14:43:40.591Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2024-45857\", \"assignerOrgId\": \"6f8de1f0-f67e-45a6-b68f-98777fdb759c\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"HiddenLayer\", \"dateReserved\": \"2024-09-10T15:36:55.926Z\", \"datePublished\": \"2024-09-12T12:53:43.963Z\", \"dateUpdated\": \"2024-09-12T14:43:45.118Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…