2024-06-12 03:29:59 +09:00
[
{
"id" : 813761890 ,
2024-06-12 09:29:24 +09:00
"name" : "ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-" ,
"full_name" : "LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-" ,
2024-06-12 03:29:59 +09:00
"owner" : {
"login" : "LordVileOnX" ,
"id" : 172425960 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/172425960?v=4" ,
"html_url" : "https:\/\/github.com\/LordVileOnX"
} ,
2024-06-12 09:29:24 +09:00
"html_url" : "https:\/\/github.com\/LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-" ,
"description" : "Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D" ,
2024-06-12 03:29:59 +09:00
"fork" : false ,
"created_at" : "2024-06-11T17:33:36Z" ,
2024-06-14 09:29:10 +09:00
"updated_at" : "2024-06-13T19:24:17Z" ,
2024-06-12 09:29:24 +09:00
"pushed_at" : "2024-06-11T23:10:10Z" ,
2024-06-14 09:29:10 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2024-06-12 03:29:59 +09:00
"has_discussions" : false ,
2024-06-14 21:30:04 +09:00
"forks_count" : 1 ,
2024-06-12 03:29:59 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-06-14 21:30:04 +09:00
"forks" : 1 ,
2024-06-14 09:29:10 +09:00
"watchers" : 2 ,
2024-06-12 09:29:24 +09:00
"score" : 0 ,
2024-06-12 15:29:36 +09:00
"subscribers_count" : 1
2024-06-12 09:29:24 +09:00
} ,
{
"id" : 813864710 ,
2024-06-13 09:29:29 +09:00
"name" : "ClearML-CVE-2024-24590" ,
"full_name" : "OxyDeV2\/ClearML-CVE-2024-24590" ,
2024-06-12 09:29:24 +09:00
"owner" : {
"login" : "OxyDeV2" ,
"id" : 46215222 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46215222?v=4" ,
"html_url" : "https:\/\/github.com\/OxyDeV2"
} ,
2024-06-13 09:29:29 +09:00
"html_url" : "https:\/\/github.com\/OxyDeV2\/ClearML-CVE-2024-24590" ,
2024-06-12 09:29:24 +09:00
"description" : "Proof of concept for CVE-2024-24590" ,
"fork" : false ,
"created_at" : "2024-06-11T22:30:26Z" ,
2024-06-15 09:29:10 +09:00
"updated_at" : "2024-06-14T20:13:28Z" ,
2024-06-13 21:29:56 +09:00
"pushed_at" : "2024-06-13T11:33:29Z" ,
2024-06-15 09:29:10 +09:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2024-06-12 09:29:24 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-06-15 09:29:10 +09:00
"watchers" : 7 ,
2024-06-12 03:29:59 +09:00
"score" : 0 ,
2024-06-12 15:29:36 +09:00
"subscribers_count" : 1
2024-06-13 03:29:49 +09:00
} ,
{
"id" : 814218929 ,
"name" : "CVE-2024-24590" ,
"full_name" : "DemonPandaz2763\/CVE-2024-24590" ,
"owner" : {
"login" : "DemonPandaz2763" ,
"id" : 69938676 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69938676?v=4" ,
"html_url" : "https:\/\/github.com\/DemonPandaz2763"
} ,
"html_url" : "https:\/\/github.com\/DemonPandaz2763\/CVE-2024-24590" ,
"description" : "Another CVE-2024-24590 poc" ,
"fork" : false ,
"created_at" : "2024-06-12T15:07:46Z" ,
"updated_at" : "2024-06-12T15:12:54Z" ,
"pushed_at" : "2024-06-12T15:12:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-06-13 15:29:29 +09:00
"subscribers_count" : 1
2024-06-14 09:29:10 +09:00
} ,
{
"id" : 814871568 ,
"name" : "CVE-2024-24590-ClearML-RCE-Exploit" ,
"full_name" : "xffsec\/CVE-2024-24590-ClearML-RCE-Exploit" ,
"owner" : {
"login" : "xffsec" ,
"id" : 162821824 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/162821824?v=4" ,
"html_url" : "https:\/\/github.com\/xffsec"
} ,
"html_url" : "https:\/\/github.com\/xffsec\/CVE-2024-24590-ClearML-RCE-Exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-06-13T22:17:57Z" ,
"updated_at" : "2024-06-14T00:16:10Z" ,
"pushed_at" : "2024-06-13T22:20:15Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
2024-06-14 15:29:37 +09:00
"subscribers_count" : 1
2024-06-15 21:29:27 +09:00
} ,
{
"id" : 815490192 ,
"name" : "CVE-2024-24590-ClearML-RCE-CMD-POC" ,
"full_name" : "diegogarciayala\/CVE-2024-24590-ClearML-RCE-CMD-POC" ,
"owner" : {
"login" : "diegogarciayala" ,
"id" : 84715095 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/84715095?v=4" ,
"html_url" : "https:\/\/github.com\/diegogarciayala"
} ,
"html_url" : "https:\/\/github.com\/diegogarciayala\/CVE-2024-24590-ClearML-RCE-CMD-POC" ,
"description" : "CVE-2024-24590 ClearML RCE&CMD POC" ,
"fork" : false ,
"created_at" : "2024-06-15T10:09:51Z" ,
2024-06-17 21:29:33 +09:00
"updated_at" : "2024-06-17T09:25:35Z" ,
2024-06-15 21:29:27 +09:00
"pushed_at" : "2024-06-15T11:09:13Z" ,
2024-06-17 21:29:33 +09:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2024-06-15 21:29:27 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-06-17 21:29:33 +09:00
"watchers" : 8 ,
2024-06-15 21:29:27 +09:00
"score" : 0 ,
2024-06-16 15:28:53 +09:00
"subscribers_count" : 1
2024-06-20 21:29:17 +09:00
} ,
{
"id" : 817754834 ,
"name" : "CVE-2024-24590" ,
"full_name" : "junnythemarksman\/CVE-2024-24590" ,
"owner" : {
"login" : "junnythemarksman" ,
"id" : 20056452 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4" ,
"html_url" : "https:\/\/github.com\/junnythemarksman"
} ,
"html_url" : "https:\/\/github.com\/junnythemarksman\/CVE-2024-24590" ,
"description" : "Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’ s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’ s system when interacted with." ,
"fork" : false ,
"created_at" : "2024-06-20T11:23:56Z" ,
"updated_at" : "2024-06-20T12:02:01Z" ,
"pushed_at" : "2024-06-20T12:01:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
2024-06-12 03:29:59 +09:00
}
]