A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network.
Metrics
Affected Vendors & Products
References
History
Fri, 21 Mar 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the `pickle.loads()` function in the `all_reduce_dict()` distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network. | |
Title | Remote Code Execution by Pickle Deserialization in open-mmlab/mmdetection | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T14:36:03.940Z
Reserved: 2024-12-02T18:03:40.519Z
Link: CVE-2024-12044

Updated: 2025-03-20T14:35:45.528Z

Status : Received
Published: 2025-03-20T10:15:26.387
Modified: 2025-03-20T10:15:26.387
Link: CVE-2024-12044

No data.