Miggo Logo

CVE-2024-37062:
ydata unsafe deserialization

7.8

CVSS Score
3.1

Basic Information

EPSS Score
0.07976%
Published
6/4/2024
Updated
6/5/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ydata-profilingpip>= 3.7.0, <= 4.8.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability CVE-2024-37062 explicitly involves unsafe deserialization via the load/loads functions in the SerializeReport class. The HiddenLayer advisory confirms that loads directly uses pickle.loads on untrusted input, and load depends on loads, making both entry points for exploitation. The provided code snippets and exploit example demonstrate these functions' roles in the insecure deserialization chain.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s*ri*liz*tion o* untrust** **t* **n o**ur in v*rsions *.*.* or n*w*r o* Y**t*'s y**t*-pro*ilin* op*n-sour** li*r*ry, *n**lin* * m*li*ously *r**t** r*port to run *r*itr*ry *o** on *n *n* us*r's syst*m w**n lo****.

Reasoning

T** vuln*r**ility *V*-****-***** *xpli*itly involv*s uns*** **s*ri*liz*tion vi* t** `lo**`/`lo**s` *un*tions in t** `S*ri*liz*R*port` *l*ss. T** *i***nL*y*r **visory *on*irms t**t `lo**s` *ir**tly us*s `pi*kl*.lo**s` on untrust** input, *n* `lo**` **