Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. text-generation
  4. ›
  5. CVE-2024-3924

CVE-2024-3924: code injection vulnerability exists in the huggingface/text-generation-inference repository

June 2, 2024

A code injection vulnerability exists in the huggingface/text-generation-inference repository, specifically within the autodocs.yml workflow file. The vulnerability arises from the insecure handling of the github.head_ref user input, which is used to dynamically construct a command for installing a software package. An attacker can exploit this by forking the repository, creating a branch with a malicious payload as the name, and then opening a pull request to the base repository. Successful exploitation could lead to arbitrary code execution within the context of the GitHub Actions runner. This issue affects versions up to and including v2.0.0 and was fixed in version 2.0.0.

References

  • github.com/advisories/GHSA-qq99-p57r-g3v7
  • github.com/huggingface/text-generation-inference
  • github.com/huggingface/text-generation-inference/commit/88702d876383f7200eccf67e28ba00500dc804bb
  • huntr.com/bounties/8af92fc2-0103-4d29-bb28-c3893154c422
  • nvd.nist.gov/vuln/detail/CVE-2024-3924

Code Behaviors & Features

Detect and mitigate CVE-2024-3924 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.0.0

Fixed versions

  • 2.0.0

Solution

Upgrade to version 2.0.0 or above.

Impact 4.4 MEDIUM

CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

pypi/text-generation/CVE-2024-3924.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:04 +0000.