We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-9701

Remote Code Execution in kedro-org/kedro



Description

A Remote Code Execution (RCE) vulnerability has been identified in the Kedro ShelveStore class (version 0.19.8). This vulnerability allows an attacker to execute arbitrary Python code via deserialization of malicious payloads, potentially leading to a full system compromise. The ShelveStore class uses Python's shelve module to manage session data, which relies on pickle for serialization. Crafting a malicious payload and storing it in the shelve file can lead to RCE when the payload is deserialized.

Reserved 2024-10-09 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Any version before 0.19.9
affected

References

huntr.com/bounties/96c77fef-93b2-4d4d-8cbe-57a718d8eea5

github.com/...ommit/d79fa51de55ac0ccb58cce1a482df1b445f0fe7c

cve.org (CVE-2024-9701)

nvd.nist.gov (CVE-2024-9701)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-9701

Support options

Helpdesk Chat, Email, Knowledgebase