Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hj4w-hm2g-p6w5

Опубликовано: 29 апр. 2025
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

vLLM Vulnerable to Remote Code Execution via Mooncake Integration

Impacted Deployments

Note that vLLM instances that do NOT make use of the mooncake integration are NOT vulnerable.

Description

vLLM integration with mooncake is vaulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack.

This is a similar to GHSA - x3m8 - f7g5 - qhm7, the problem is in

https://github.com/vllm-project/vllm/blob/32b14baf8a1f7195ca09484de3008063569b43c5/vllm/distributed/kv_transfer/kv_pipe/mooncake_pipe.py#L179

Here recv_pyobj() Contains implicit pickle.loads(), which leads to potential RCE.

Пакеты

Наименование

vllm

pip
Затронутые версииВерсия исправления

>= 0.6.5, < 0.8.5

0.8.5

EPSS

Процентиль: 73%
0.0077
Низкий

10 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 10
redhat
5 месяцев назад

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.

CVSS3: 10
nvd
5 месяцев назад

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.

CVSS3: 10
debian
5 месяцев назад

vLLM is a high-throughput and memory-efficient inference and serving e ...

EPSS

Процентиль: 73%
0.0077
Низкий

10 Critical

CVSS3

Дефекты

CWE-502