CVE-2024-37062

7.8 HIGH

📋 TL;DR

This vulnerability in ydata-profiling library allows remote code execution when a maliciously crafted report is loaded. Attackers can execute arbitrary code on systems running vulnerable versions. Users of ydata-profiling 3.7.0 or newer who load untrusted profiling reports are affected.

💻 Affected Systems

Products:
  • ydata-profiling
Versions: >= 3.7.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any system using ydata-profiling to load profiling reports from untrusted sources is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Data theft, installation of malware or backdoors, and potential privilege escalation on the compromised system.

🟢

If Mitigated

Limited impact with proper input validation and sandboxing, potentially only denial of service or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the victim to load a malicious profiling report, which could be delivered via phishing or compromised data sources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://hiddenlayer.com/sai-security-advisory/ydata-june2024

Restart Required: No

Instructions:

1. Check current ydata-profiling version
2. Update to patched version via pip: pip install --upgrade ydata-profiling
3. Verify update with: pip show ydata-profiling

🔧 Temporary Workarounds

Restrict report sources

all

Only load profiling reports from trusted, verified sources

Input validation

all

Implement strict validation of profiling report files before processing

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems using ydata-profiling
  • Deploy application allowlisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check ydata-profiling version with: pip show ydata-profiling | grep Version

Check Version:

pip show ydata-profiling | grep Version

Verify Fix Applied:

Confirm version is below 3.7.0 or updated to patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from ydata-profiling context
  • Failed deserialization attempts
  • Unexpected network connections from profiling processes

Network Indicators:

  • Outbound connections to suspicious IPs after report processing
  • Unusual data exfiltration patterns

SIEM Query:

process.name: "python" AND process.args: "ydata-profiling" AND event.action: "process_start"

🔗 References

📤 Share & Export