Miggo Logo

CVE-2024-11393:
Deserialization of Untrusted Data in Hugging Face Transformers

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.97063%
Published
11/23/2024
Updated
2/13/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
transformerspip>= 0, < 4.48.04.48.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from model conversion scripts that handle deserialization of checkpoint files. The linked GitHub PR #35296 explicitly removes these scripts from release wheels due to their use of insecure deserialization (e.g., loading pickle or legacy .bin files). These scripts lack proper validation, enabling RCE when untrusted model files are loaded. While specific function names aren't provided in the sources, the removal of conversion scripts in the patch confirms their role in the vulnerability. The confidence is high due to the direct correlation between the CVE description, the patch action, and the nature of deserialization in conversion workflows.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u**in* **** Tr*ns*orm*rs M*sk*orm*r Mo**l **s*ri*liz*tion o* Untrust** **t* R*mot* *o** *x**ution Vuln*r**ility. T*is vuln*r**ility *llows r*mot* *tt**k*rs to *x**ut* *r*itr*ry *o** on *****t** inst*ll*tions o* *u**in* **** Tr*ns*orm*rs. Us*r int*r*

Reasoning

T** vuln*r**ility st*ms *rom mo**l *onv*rsion s*ripts t**t **n*l* **s*ri*liz*tion o* ****kpoint *il*s. T** link** *it*u* PR #***** *xpli*itly r*mov*s t**s* s*ripts *rom r*l**s* w***ls *u* to t**ir us* o* ins**ur* **s*ri*liz*tion (*.*., lo**in* pi*kl*