Skip to main content

CVE-2024-24591: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Allegro.AI ClearML

High
VulnerabilityCVE-2024-24591cvecve-2024-24591cwe-22
Published: Tue Feb 06 2024 (02/06/2024, 14:40:56 UTC)
Source: CVE
Vendor/Project: Allegro.AI
Product: ClearML

Description

A path traversal vulnerability in versions 1.4.0 to 1.14.1 of the client SDK of Allegro AI’s ClearML platform enables a maliciously uploaded dataset to write local or remote files to an arbitrary location on an end user’s system when interacted with.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:57:33 UTC

Technical Analysis

CVE-2024-24591 is a high-severity path traversal vulnerability affecting the client SDK of Allegro.AI's ClearML platform, specifically versions 1.4.0 through 1.14.1. ClearML is a machine learning operations (MLOps) platform used to manage datasets, experiments, and workflows. The vulnerability arises from improper limitation of pathname inputs (CWE-22), allowing a maliciously crafted dataset uploaded to the platform to write files to arbitrary locations on the local or remote file system when the dataset is accessed or interacted with by the end user. This means an attacker can potentially overwrite or create files outside the intended directory scope, leading to unauthorized file manipulation. The vulnerability requires some level of privileges (PR:L) and user interaction (UI:R) but can be exploited remotely (AV:N) with low attack complexity (AC:L). The impact includes full compromise of confidentiality, integrity, and availability of the affected system, as arbitrary file writes can lead to code execution, data corruption, or system disruption. No known exploits are currently reported in the wild, but the high CVSS score (8.0) indicates significant risk if weaponized. The lack of available patches at the time of disclosure increases the urgency for mitigation. This vulnerability is particularly critical in environments where ClearML is used to manage sensitive or critical machine learning workflows, as it could allow attackers to inject malicious code or disrupt AI model training and deployment pipelines.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on ClearML for AI and machine learning operations in sectors such as finance, healthcare, manufacturing, and research. Exploitation could lead to unauthorized access to sensitive data, manipulation of machine learning datasets or models, and disruption of AI-driven services. This could result in data breaches, loss of intellectual property, regulatory non-compliance (e.g., GDPR violations), and operational downtime. Given the increasing adoption of AI technologies across Europe, the vulnerability poses a risk to organizations' digital transformation initiatives and could undermine trust in AI systems. Furthermore, the ability to write arbitrary files remotely could be leveraged to deploy ransomware or other malware, amplifying the threat to business continuity and data integrity.

Mitigation Recommendations

Organizations using ClearML versions 1.4.0 to 1.14.1 should immediately audit their deployments and restrict dataset uploads to trusted sources only. Implement strict input validation and sanitization on dataset paths to prevent path traversal attempts. Employ network segmentation and least privilege principles to limit the SDK's access to critical file system areas. Monitor file system changes and application logs for suspicious activity related to dataset interactions. Until an official patch is released, consider isolating ClearML client SDK environments using containerization or sandboxing to contain potential exploitation. Engage with Allegro.AI for updates on patches or workarounds. Additionally, conduct security awareness training for users interacting with datasets to recognize and avoid suspicious uploads. Regularly back up critical data and maintain incident response plans tailored to AI infrastructure compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HiddenLayer
Date Reserved
2024-01-25T22:42:48.977Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec389

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:57:33 PM

Last updated: 8/18/2025, 11:32:15 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats