CVE-2024-34072: sagemaker-python-sdk vulnerable to Deserialization of Untrusted Data
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62152%
CWE
Published
5/3/2024
Updated
5/3/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| sagemaker | pip | < 2.218.0 | 2.218.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the NumpyDeserializer's deserialize method using numpy.load() with allow_pickle=True by default in versions <2.218.0. The commit diff shows the deserialization logic directly used the class's allow_pickle parameter (which was True by default pre-patch) when loading NPY/NPZ formats. This combination allows dangerous pickle deserialization. The vulnerability was fixed by setting allow_pickle=False by default and adding explicit error handling to prevent silent use of pickle loading without explicit opt-in.