Логотип exploitDog
bind:CVE-2024-5980
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-5980

Количество 2

Количество 2

nvd логотип

CVE-2024-5980

больше 1 года назад

A vulnerability in the /v1/runs API endpoint of lightning-ai/pytorch-lightning v2.2.4 allows attackers to exploit path traversal when extracting tar.gz files. When the LightningApp is running with the plugin_server, attackers can deploy malicious tar.gz plugins that embed arbitrary files with path traversal vulnerabilities. This can result in arbitrary files being written to any directory in the victim's local file system, potentially leading to remote code execution.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-mr7h-w2qc-ffc2

больше 1 года назад

pytorch-lightning vulnerable to Arbitrary File Write via /v1/runs API endpoint

CVSS3: 9.1
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-5980

A vulnerability in the /v1/runs API endpoint of lightning-ai/pytorch-lightning v2.2.4 allows attackers to exploit path traversal when extracting tar.gz files. When the LightningApp is running with the plugin_server, attackers can deploy malicious tar.gz plugins that embed arbitrary files with path traversal vulnerabilities. This can result in arbitrary files being written to any directory in the victim's local file system, potentially leading to remote code execution.

CVSS3: 9.8
11%
Средний
больше 1 года назад
github логотип
GHSA-mr7h-w2qc-ffc2

pytorch-lightning vulnerable to Arbitrary File Write via /v1/runs API endpoint

CVSS3: 9.1
11%
Средний
больше 1 года назад

Уязвимостей на страницу