We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A Remote Code Execution (RCE) vulnerability has been identified in the Kedro ShelveStore class (version 0.19.8). This vulnerability allows an attacker to execute arbitrary Python code via deserialization of malicious payloads, potentially leading to a full system compromise. The ShelveStore class uses Python's shelve module to manage session data, which relies on pickle for serialization. Crafting a malicious payload and storing it in the shelve file can lead to RCE when the payload is deserialized.
Reserved 2024-10-09 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_aiCWE-502 Deserialization of Untrusted Data
huntr.com/bounties/96c77fef-93b2-4d4d-8cbe-57a718d8eea5
github.com/...ommit/d79fa51de55ac0ccb58cce1a482df1b445f0fe7c
Support options