
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the /v1/runs API endpoint of lightning-ai/pytorch-lightning version 2.2.4. This security flaw allows attackers to exploit path traversal when extracting tar.gz files. The vulnerability was disclosed on June 27, 2024, and affects systems running the specified version with the plugin_server enabled (NVD).
The vulnerability occurs when the LightningApp is running with the plugin_server, where attackers can deploy malicious tar.gz plugins that embed arbitrary files with path traversal vulnerabilities. The severity of this vulnerability is rated as CRITICAL with a CVSS v3.0 base score of 9.1 (Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) (NVD, Huntr).
The exploitation of this vulnerability can result in arbitrary files being written to any directory in the victim's local file system, potentially leading to remote code execution. This poses a significant security risk as it could allow attackers to gain unauthorized access and control over the affected system (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."