CVE-2024-24590

8.0 HIGH

📋 TL;DR

This vulnerability in Allegro AI's ClearML client SDK allows remote code execution through deserialization of untrusted data. An attacker can upload a malicious artifact that executes arbitrary code on a user's system when interacted with. Users of ClearML versions 0.17.0 through 1.14.2 are affected.

💻 Affected Systems

Products:
  • Allegro AI ClearML Client SDK
Versions: 0.17.0 to 1.14.2
Operating Systems: All platforms running ClearML
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction with a malicious artifact uploaded to the ClearML platform.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the user's system leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Execution of malicious code on individual user workstations, potentially stealing credentials or installing malware.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are enforced.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires uploading a malicious artifact and user interaction, but the deserialization vulnerability itself is straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.14.3

Vendor Advisory: https://github.com/allegroai/clearml/releases/tag/1.14.3

Restart Required: No

Instructions:

1. Update ClearML client SDK to version 1.14.3 or later. 2. Run: pip install --upgrade clearml>=1.14.3

🔧 Temporary Workarounds

Restrict artifact uploads

all

Limit who can upload artifacts to trusted users only and implement file type restrictions.

Network segmentation

all

Isolate ClearML instances from critical systems and implement strict outbound firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls on artifact upload functionality
  • Monitor for suspicious artifact uploads and user interactions with artifacts

🔍 How to Verify

Check if Vulnerable:

Check ClearML version: python -c "import clearml; print(clearml.__version__)"

Check Version:

python -c "import clearml; print(clearml.__version__)"

Verify Fix Applied:

Verify version is 1.14.3 or higher using the same command

📡 Detection & Monitoring

Log Indicators:

  • Unusual artifact uploads from unexpected sources
  • Process execution from ClearML artifact directories

Network Indicators:

  • Outbound connections from ClearML processes to suspicious IPs

SIEM Query:

Process creation where parent process contains 'clearml' AND command line contains suspicious patterns

🔗 References

📤 Share & Export