CVE-2024-8019
ADVISORY - githubSummary
In lightning-ai/pytorch-lightning version 2.3.2, a vulnerability exists in the LightningApp
when running on a Windows host. The vulnerability occurs at the /api/v1/upload_file/
endpoint, allowing an attacker to write or overwrite arbitrary files by providing a crafted filename. This can lead to potential remote code execution (RCE) by overwriting critical files or placing malicious files in sensitive locations.
EPSS Score: 0.00467 (0.636)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Unrestricted Upload of File with Dangerous Type
ADVISORY - github
Unrestricted Upload of File with Dangerous Type
NIST
CREATED
UPDATED
ADVISORY IDCVE-2024-8019
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
9.1criticalGitHub
CREATED
UPDATED
ADVISORY IDGHSA-4cv3-v7pv-rfhf
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
9.1criticalChainguard
CREATED
UPDATED
ADVISORY ID
CGA-6r8c-cx7p-4h59
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-