This is about exploiting insecure pickle files. It was disclosed that an attacker could create a pickle file which contains an arbitrary code and upload it as an artifact to a project via the API.
Anytime a user calls the get method within the Artifact class to download and load a file into memory, the pickle file is deserialized on their system, running any arbitrary code it contains.
- Find the domains
- Save the subdomains in your hosts file
- Create a project on ClearML
- Setup clearml using the provided steps while creating a new experiment
- Run 'python exploitCML.py' (user.txt)
- Upload pytorch file to ClearML server
- Setup a listener get connection (root.txt)