CVE-2024-8019

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-8019
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-8019.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-8019
Aliases
Related
Published
2025-03-20T10:15:39Z
Modified
2025-03-21T22:05:50.842138Z
Summary
[none]
Details

In lightning-ai/pytorch-lightning version 2.3.2, a vulnerability exists in the LightningApp when running on a Windows host. The vulnerability occurs at the /api/v1/upload_file/ endpoint, allowing an attacker to write or overwrite arbitrary files by providing a crafted filename. This can lead to potential remote code execution (RCE) by overwriting critical files or placing malicious files in sensitive locations.

References

Affected packages

Git / github.com/lightning-ai/pytorch-lightning

Affected ranges

Type
GIT
Repo
https://github.com/lightning-ai/pytorch-lightning
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.0.1
0.0.2
0.1.1
0.1.2
0.10.0
0.2
0.2.1
0.2.2
0.2.3
0.2.4
0.2.5
0.2.6
0.3
0.3.1
0.3.2
0.3.3
0.3.4
0.3.5
0.3.6
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5
0.4.6
0.4.7
0.4.9
0.5.0
0.5.1
0.5.2
0.5.2.1
0.5.3
0.5.3.1
0.5.3.2
0.6.0
0.7.0
0.7.1
0.7.2
0.7.3
0.7.4
0.7.5
0.7.6
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.9.0

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.1.0
1.1.0rc1
1.1.0rc2
1.2.0
1.2.0rc1
1.2.0rc2
1.3.0
1.3.0rc0
1.3.0rc1
1.3.0rc2
1.3.0rc3
1.4.0
1.4.0rc0
1.4.0rc1
1.4.0rc2
1.5.0
1.5.0rc0
1.5.0rc1
1.6.0
1.6.0rc0
1.6.0rc1
1.7.0
1.7.0rc0
1.7.0rc1
1.8.0
1.8.0rc0
1.8.0rc1
1.8.0rc2
1.9.0
1.9.0rc0

2.*

2.0.0
2.0.0rc0
2.1.0
2.1.0.rc0
2.1.0.rc1
2.2.0
2.2.0.rc0
2.3.0

app/0.*

app/0.6.0rc0