AVID-2026-R1573
Description
RCE via Property/Class Pollution in lightning-ai/pytorch-lightning (CVE-2024-5452)
Details
A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the deepdiff library. The library uses deepdiff.Delta objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.
Reason for inclusion in AVID: The CVE describes an RCE vulnerability in lightning-ai/pytorch-lightning (an AI framework) via deserialization/Delta object manipulation, allowing arbitrary code execution in self-hosted AI apps. This is a software supply-chain issue in a component used to build/deploy AI systems, not hardware. The report provides CVE, affected version, vulnerability behavior, and CVSS scoring, supporting inclusion in AVID curation.
References
- NVD entry
- https://huntr.com/bounties/486add92-275e-4a7b-92f9-42d84bc759da
- https://github.com/lightning-ai/pytorch-lightning/commit/330af381de88cff17515418a341cbc1f9f127f9a
Affected or Relevant Artifacts
- Developer: lightning-ai
- Deployer: lightning-ai
- Artifact Details:
| Type | Name |
|---|---|
| System | lightning-ai/pytorch-lightning |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Base Score | 9.8 |
| Base Severity | 🔴 Critical |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-915 | CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-06-06
- Version: 0.3.3
- AVID Entry