We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-11041

Remote Code Execution in vllm-project/vllm



Description

vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.

Reserved 2024-11-09 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Any version
affected

References

huntr.com/bounties/00136195-11e0-4ad0-98d5-72db066e867f

cve.org (CVE-2024-11041)

nvd.nist.gov (CVE-2024-11041)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-11041

Support options

Helpdesk Chat, Email, Knowledgebase