CVE-2024-9363

7.5 HIGH

📋 TL;DR

An unauthenticated attacker can delete critical files like polyaxon.sock within Polyaxon containers, causing API containers to exit and leading to denial of service. This affects all Polyaxon deployments running vulnerable versions, disrupting the entire platform's functionality.

💻 Affected Systems

Products:
  • Polyaxon
Versions: Latest version at time of disclosure (specific version not specified in CVE)
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Polyaxon deployments with default configurations; all deployments are vulnerable if unpatched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete platform outage with all API containers terminated, preventing any ML workflow execution or management.

🟠

Likely Case

Service disruption affecting ML pipelines and API availability until containers are manually restarted.

🟢

If Mitigated

Limited impact if proper network segmentation and container isolation are implemented.

🌐 Internet-Facing: HIGH - No authentication required, simple exploit can cause immediate service disruption.
🏢 Internal Only: HIGH - Even internal attackers or compromised services can exploit this without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file deletion attack requiring minimal technical skill; no authentication or UUID parameters needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Polyaxon GitHub releases for latest patched version

Vendor Advisory: https://huntr.com/bounties/ec7b7e1d-795d-4414-93d5-9df35d2fd391

Restart Required: Yes

Instructions:

1. Update Polyaxon to latest patched version. 2. Restart all Polyaxon containers. 3. Verify API functionality is restored.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to Polyaxon API endpoints to trusted sources only

iptables -A INPUT -p tcp --dport [POLYAXON_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [POLYAXON_PORT] -j DROP

Container File Protection

linux

Make critical files immutable or mount them as read-only

chattr +i /path/to/polyaxon.sock
docker run -v /host/path:/container/path:ro ...

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to Polyaxon services
  • Deploy monitoring to detect file deletion attempts and container restarts

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated requests can delete polyaxon.sock file in containers

Check Version:

polyaxon version or check container image tags

Verify Fix Applied:

Verify polyaxon.sock file cannot be deleted without proper authentication after update

📡 Detection & Monitoring

Log Indicators:

  • Unexpected container exits
  • File deletion events for polyaxon.sock
  • API connection failures

Network Indicators:

  • Unusual DELETE requests to Polyaxon endpoints
  • Traffic from unexpected sources to Polyaxon ports

SIEM Query:

source="polyaxon" AND ("container exited" OR "file deleted" OR "polyaxon.sock")

🔗 References

📤 Share & Export