Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24590 PoC — Allegro 代码问题漏洞

Source
Associated Vulnerability
Title:Allegro 代码问题漏洞 (CVE-2024-24590)
Description:Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’s system when interacted with.
Description
Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D
Readme
## How it works-
### Need access to the team work space

Replace **IP** and **PORT** to your listener port and IP

Change the project name to an existing project name.

**IMPORTANT... YOU MIGHT NEED TO UPLOAD IT A COUPLE OF TIMES (RUN THE EXPLOIT A COUPLE OF TIMES)...**

@lrdvile on x

thank me later :D

## example of use

1. click on start new project on clearml
2. install clearml on terminal with pip
3. get the creds from clearml web (gen creds from clicking new project)
4. clearml-init in ur terminal and paste in the creds
5. nc -lnvp 4444
6. python exploit.py



reference:
https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/
File Snapshot

[4.0K] /data/pocs/bbdb44347a9e9f6616030c1b6e1fc5ca9a760433 ├── [ 441] exploit.py └── [ 693] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →