AVID-2026-R1559
Description
ReDoS in Giskard Scan text perturbation (CVE-2024-52524)
Details
Giskard is an evaluation and testing framework for AI systems. A Remote Code Execution (ReDoS) vulnerability was discovered in Giskard component by the GitHub Security Lab team. When processing datasets with specific text patterns with Giskard detectors, this vulnerability could trigger exponential regex evaluation times, potentially leading to denial of service. Giskard versions prior to 2.15.5 are affected.
Reason for inclusion in AVID: This CVE describes a Denial-of-Service (ReDoS) vulnerability in Giskard, an evaluation framework used in AI systems. It affects a software artifact (Giskard) used in AI pipelines for testing/evaluation, thus is relevant to the AI software supply chain. The issue arises from inefficient regular expression evaluation (CWE-1333) and can cause denial of service, a security vulnerability. Sufficient evidence is provided via CVE-2024-52524, GHSA advisory, and references to the affected commit and NVD entry.
References
- NVD entry
- https://github.com/Giskard-AI/giskard/security/advisories/GHSA-pjwm-cr36-mwv3
- https://github.com/Giskard-AI/giskard/commit/48ce81f5c626171767188d6f0669498fb613b4d3
Affected or Relevant Artifacts
- Developer: Giskard-AI
- Deployer: Giskard-AI
- Artifact Details:
| Type | Name |
|---|---|
| System | giskard |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CWE
| ID | Description |
|---|---|
| CWE-1333 | CWE-1333: Inefficient Regular Expression Complexity |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-11-14
- Version: 0.3.3
- AVID Entry