CVE-2024-10073: Flair allows arbitrary code execution
5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.14258%
CWE
Published
10/17/2024
Updated
10/24/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| flair | pip | <= 0.14.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- Multiple sources (GitHub Advisory, NVD, VulDB) explicitly reference ClusteringModel in clustering.py as the vulnerable component.
- The CWE-94 classification indicates code injection via improper input handling during deserialization.
- Submission details and PoC references demonstrate exploitation through model loading.
- The pattern matches common Python pickle-based exploits where untrusted serialized data leads to RCE.
- High confidence comes from consistent technical details across advisories and explicit path/component references.