Cyber Posture

CVE-2024-39272

Critical

Published: 06 February 2025

Published
06 February 2025
Modified
05 September 2025
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0063 70.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may acquire credentials from web browsers by reading files specific to the target browser.

Security Summary

CVE-2024-39272 is a cross-site scripting (XSS) vulnerability in the dataset upload functionality of ClearML Enterprise Server version 3.22.5-1533. The flaw allows a specially crafted HTTP request to execute arbitrary HTML code, triggered by sending a series of HTTP requests to the affected component.

An attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity (AC:L), though it requires user interaction (UI:R). Successful exploitation changes scope (S:C) and results in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), enabling the execution of arbitrary HTML code in the context of the application.

The primary advisory is detailed in the Talos Intelligence vulnerability report TALOS-2024-2110, available at https://talosintelligence.com/vulnerability_reports/TALOS-2024-2110.

Details

CWE(s)
CWE-79

Affected Products

clear
clearml enterprise server
3.22.5-1533

AI Security Analysis

AI Category
Other Platforms
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
ClearML is an open-source AI platform supporting the entire AI development lifecycle from research to production, including dataset management, model training, and deployment. The vulnerability is in its Enterprise Server's dataset upload functionality, fitting as an 'Other Platforms' AI tool.

MITRE ATT&CK Enterprise Techniques

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1555.003 Credentials from Web Browsers Credential Access
Adversaries may acquire credentials from web browsers by reading files specific to the target browser.
Why these techniques?

XSS vulnerability in dataset upload allows low-privileged attackers to inject malicious HTML/JS, which executes in victims' browsers when viewing datasets, enabling drive-by compromise via malicious content on legitimate server (T1189), exploitation of public-facing web application (T1190), and theft of session cookies or localStorage credentials like cloud storage secrets (T1539, T1555.003).

References