CVE-2024-0960: flink-extended ai-flow workflow_command.py cloudpickle.loads deserialization

5.0 CVSS

Description

A vulnerability was found in flink-extended ai-flow 0.3.1. It has been declared as critical. Affected by this vulnerability is the function cloudpickle.loads of the file \ai_flow\cli\commands\workflow_command.py. The manipulation leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252205 was assigned to this vulnerability. In flink-extended ai-flow 0.3.1 wurde eine kritische Schwachstelle ausgemacht. Es geht um die Funktion cloudpickle.loads der Datei \ai_flow\cli\commands\workflow_command.py. Durch Manipulieren mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2024-0960

CVSS Base Severity: MEDIUM

CVSS Base Score: 5.0

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Problem Types

CWE-502 Deserialization

Affected Products

Vendor: flink-extended

Product: ai-flow

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 13.62% (scored less or equal to compared to others)

EPSS Date: 2025-06-08 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: partial

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-0960
https://vuldb.com/?id.252205
https://vuldb.com/?ctiid.252205
https://github.com/bayuncao/vul-cve-8
https://github.com/bayuncao/vul-cve-8/blob/main/dataset.pkl

Timeline