Miggo Logo

CVE-2024-11394: Deserialization of Untrusted Data in Hugging Face Transformers

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.9386%
Published
11/23/2024
Updated
2/13/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
transformerspip>= 0, < 4.48.04.48.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure deserialization in model conversion scripts, as indicated by the patch removing these scripts from release wheels (PR #35296). The scripts handled formats like pickle, which are inherently unsafe when loading untrusted data. While explicit function names aren't provided in the advisory, the context strongly points to Trax model conversion scripts as the attack vector. The high confidence comes from the direct correlation between the patch action (removing conversion scripts) and the vulnerability description (unsafe deserialization in model handling).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u**in* **** Tr*ns*orm*rs Tr*x Mo**l **s*ri*liz*tion o* Untrust** **t* R*mot* *o** *x**ution Vuln*r**ility. T*is vuln*r**ility *llows r*mot* *tt**k*rs to *x**ut* *r*itr*ry *o** on *****t** inst*ll*tions o* *u**in* **** Tr*ns*orm*rs. Us*r int*r**tion

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* **s*ri*liz*tion in mo**l *onv*rsion s*ripts, *s in*i**t** *y t** p*t** r*movin* t**s* s*ripts *rom r*l**s* w***ls (PR #*****). T** s*ripts **n*l** *orm*ts lik* pi*kl*, w*i** *r* in**r*ntly uns*** w**n lo**in* unt