Plataforma
python
Componente
rasa
Corrigido em
3.6.22
CVE-2024-49375 describes a Remote Code Execution (RCE) vulnerability within the Rasa open-source machine learning framework. An attacker can achieve RCE by remotely loading a maliciously crafted model into a Rasa instance. This vulnerability affects versions of Rasa up to and including 3.6.21, and a patch is available in version 3.6.21.
Successful exploitation of CVE-2024-49375 allows an attacker to execute arbitrary code on the Rasa server with the privileges of the Rasa process. This could lead to complete system compromise, data exfiltration, or denial of service. The prerequisites for exploitation are the enabling of the HTTP API (using --enable-api) and, in the unauthenticated case, a lack of security controls. Authentication is required for authenticated RCE, necessitating a valid authentication token.
CVE-2024-49375 was published on 2025-01-14. The vulnerability's severity is rated as CRITICAL (CVSS 9.1). Public proof-of-concept exploits are currently unknown, but the ease of exploitation given the prerequisites suggests a potential for rapid exploitation if widely publicized. It is not currently listed on CISA KEV.
Organizations deploying Rasa for conversational AI applications are at risk, particularly those with the HTTP API enabled and lacking proper authentication. Shared hosting environments where multiple Rasa instances share resources are also at increased risk, as a compromise of one instance could potentially lead to compromise of others.
• python / server:
import subprocess
result = subprocess.run(['rasa', '--version'], capture_output=True, text=True)
if result.stdout.startswith('Rasa==3.6'):
print('Vulnerable version detected!')• python / server: Check for the --enable-api flag in Rasa startup scripts or configuration files.
• generic web: Monitor access logs for unusual POST requests to the /webhooks/rest/webhook endpoint.
• generic web: Check Rasa server configuration for authentication settings and ensure they are properly configured.
disclosure
Status do Exploit
EPSS
3.29% (percentil 87%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2024-49375 is to upgrade Rasa to version 3.6.21 or later. If upgrading is not immediately feasible, disable the HTTP API by not using the --enable-api flag during Rasa server startup. Implement robust authentication and authorization mechanisms to restrict access to the API. Monitor Rasa server logs for suspicious activity, particularly related to model loading and API requests. Consider using a Web Application Firewall (WAF) to filter malicious requests.
Atualize Rasa para a versão 3.6.21 ou superior. Se não puder atualizar, certifique-se de habilitar a autenticação e restringir o acesso apenas a usuários confiáveis. Desabilite a API HTTP se não for necessária.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2024-49375 is a CRITICAL RCE vulnerability in Rasa versions up to 3.6.21. An attacker can execute arbitrary code by loading a malicious model via the HTTP API if it's enabled and not properly secured.
You are affected if you are using Rasa versions 3.6.21 or earlier and have the HTTP API enabled. Check your Rasa version and API configuration immediately.
Upgrade to Rasa version 3.6.21 or later. If upgrading is not possible, disable the HTTP API and implement strong authentication.
There are currently no confirmed reports of active exploitation, but the vulnerability's severity and ease of exploitation suggest a potential for future attacks.
Refer to the official Rasa security advisory on their website for detailed information and updates: [https://rasa.com/docs/rasa/security/](https://rasa.com/docs/rasa/security/)
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo requirements.txt e descubra na hora se você está afetado.