[ { "id": 813761890, "name": "ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-", "full_name": "HexDoesRandomShit\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-", "owner": { "login": "HexDoesRandomShit", "id": 172425960, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172425960?v=4", "html_url": "https:\/\/github.com\/HexDoesRandomShit" }, "html_url": "https:\/\/github.com\/HexDoesRandomShit\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-", "description": "Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D", "fork": false, "created_at": "2024-06-11T17:33:36Z", "updated_at": "2024-07-31T19:12:59Z", "pushed_at": "2024-07-31T19:12:56Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 813864710, "name": "ClearML-CVE-2024-24590", "full_name": "OxyDeV2\/ClearML-CVE-2024-24590", "owner": { "login": "OxyDeV2", "id": 46215222, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46215222?v=4", "html_url": "https:\/\/github.com\/OxyDeV2" }, "html_url": "https:\/\/github.com\/OxyDeV2\/ClearML-CVE-2024-24590", "description": "Proof of concept for CVE-2024-24590", "fork": false, "created_at": "2024-06-11T22:30:26Z", "updated_at": "2024-06-14T20:13:28Z", "pushed_at": "2024-06-13T11:33:29Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 814871568, "name": "CVE-2024-24590-ClearML-RCE-Exploit", "full_name": "xffsec\/CVE-2024-24590-ClearML-RCE-Exploit", "owner": { "login": "xffsec", "id": 162821824, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162821824?v=4", "html_url": "https:\/\/github.com\/xffsec" }, "html_url": "https:\/\/github.com\/xffsec\/CVE-2024-24590-ClearML-RCE-Exploit", "description": null, "fork": false, "created_at": "2024-06-13T22:17:57Z", "updated_at": "2024-06-14T00:16:10Z", "pushed_at": "2024-06-13T22:20:15Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 815490192, "name": "CVE-2024-24590-ClearML-RCE-CMD-POC", "full_name": "diegogarciayala\/CVE-2024-24590-ClearML-RCE-CMD-POC", "owner": { "login": "diegogarciayala", "id": 84715095, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84715095?v=4", "html_url": "https:\/\/github.com\/diegogarciayala" }, "html_url": "https:\/\/github.com\/diegogarciayala\/CVE-2024-24590-ClearML-RCE-CMD-POC", "description": "CVE-2024-24590 ClearML RCE&CMD POC", "fork": false, "created_at": "2024-06-15T10:09:51Z", "updated_at": "2024-06-17T09:25:35Z", "pushed_at": "2024-06-15T11:09:13Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 817754834, "name": "CVE-2024-24590", "full_name": "junnythemarksman\/CVE-2024-24590", "owner": { "login": "junnythemarksman", "id": 20056452, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4", "html_url": "https:\/\/github.com\/junnythemarksman" }, "html_url": "https:\/\/github.com\/junnythemarksman\/CVE-2024-24590", "description": "Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’s system when interacted with.", "fork": false, "created_at": "2024-06-20T11:23:56Z", "updated_at": "2024-06-21T00:52:48Z", "pushed_at": "2024-06-21T00:52:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 831603638, "name": "ClearML-CVE-2024-24590-RCE", "full_name": "sviim\/ClearML-CVE-2024-24590-RCE", "owner": { "login": "sviim", "id": 172663851, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172663851?v=4", "html_url": "https:\/\/github.com\/sviim" }, "html_url": "https:\/\/github.com\/sviim\/ClearML-CVE-2024-24590-RCE", "description": "With this script you can exploit the CVE-2024-24590", "fork": false, "created_at": "2024-07-21T04:16:24Z", "updated_at": "2024-07-30T16:10:35Z", "pushed_at": "2024-07-21T04:48:47Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 } ]