Miggo Logo

CVE-2024-10073: Flair allows arbitrary code execution

5

CVSS Score
3.1

Basic Information

EPSS Score
0.14258%
Published
10/17/2024
Updated
10/24/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
flairpip<= 0.14.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. Multiple sources (GitHub Advisory, NVD, VulDB) explicitly reference ClusteringModel in clustering.py as the vulnerable component.
  2. The CWE-94 classification indicates code injection via improper input handling during deserialization.
  3. Submission details and PoC references demonstrate exploitation through model loading.
  4. The pattern matches common Python pickle-based exploits where untrusted serialized data leads to RCE.
  5. High confidence comes from consistent technical details across advisories and explicit path/component references.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility, w*i** w*s *l*ssi*i** *s *riti**l, w*s *oun* in *l*irNLP *l*ir *.**.*. *****t** is t** *un*tion *lust*rin*Mo**l o* t** *il* *l*ir\mo**ls\*lust*rin*.py o* t** *ompon*nt Mo** *il* Lo***r. T** m*nipul*tion l***s to *o** inj**tion. It is

Reasoning

*. Multipl* sour**s (*it*u* **visory, NV*, Vul**) *xpli*itly r***r*n** *lust*rin*Mo**l in *lust*rin*.py *s t** vuln*r**l* *ompon*nt. *. T** *W*-** *l*ssi*i**tion in*i**t*s *o** inj**tion vi* improp*r input **n*lin* *urin* **s*ri*liz*tion. *. Su*missi