Описание
Horovod versions up to and including v0.28.1 are vulnerable to unauthenticated remote code execution. The vulnerability is due to improper handling of base64-encoded data in the ElasticRendezvousHandler, a subclass of KVStoreHandler. Specifically, the _put_value method in ElasticRendezvousHandler calls codec.loads_base64(value), which eventually invokes cloudpickle.loads(decoded). This allows an attacker to send a malicious pickle object via a PUT request, leading to arbitrary code execution on the server.
Ссылки
- ExploitIssue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.28.1 (включая)
cpe:2.3:a:horovod:horovod:*:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.01408
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-502
Связанные уязвимости
EPSS
Процентиль: 80%
0.01408
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-502