Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown

CVE-2024-5980

Disclosure Date: June 27, 2024 (last updated June 28, 2024)
A vulnerability in the /v1/runs API endpoint of lightning-ai/pytorch-lightning v2.2.4 allows attackers to exploit path traversal when extracting tar.gz files. When the LightningApp is running with the plugin_server, attackers can deploy malicious tar.gz plugins that embed arbitrary files with path traversal vulnerabilities. This can result in arbitrary files being written to any directory in the victim's local file system, potentially leading to remote code execution.
0
Attacker Value
Unknown

CVE-2024-5452

Disclosure Date: June 06, 2024 (last updated October 10, 2024)
A remote code execution (RCE) vulnerability exists in the lightning-ai/pytorch-lightning library version 2.2.1 due to improper handling of deserialized user input and mismanagement of dunder attributes by the `deepdiff` library. The library uses `deepdiff.Delta` objects to modify application state based on frontend actions. However, it is possible to bypass the intended restrictions on modifying dunder attributes, allowing an attacker to construct a serialized delta that passes the deserializer whitelist and contains dunder attributes. When processed, this can be exploited to access other modules, classes, and instances, leading to arbitrary attribute write and total RCE on any self-hosted pytorch-lightning application in its default configuration, as the delta endpoint is enabled by default.
Attacker Value
Unknown

CVE-2022-0845

Disclosure Date: March 05, 2022 (last updated October 09, 2024)
Code Injection in GitHub repository pytorchlightning/pytorch-lightning prior to 1.6.0.
Attacker Value
Unknown

CVE-2021-4118

Disclosure Date: December 23, 2021 (last updated February 23, 2025)
pytorch-lightning is vulnerable to Deserialization of Untrusted Data