
We found results for “”
CVE-2024-27318
Good to know:

Date: February 23, 2024
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.
Language: C++
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix

Upgrade Version
Upgrade to version onnx-shape-inference - no_fix;onnx - no_fix;onnx - 1.12.0.1f3cecc6a07527dd132e416f78f5400667fa9e6f;onnx - 1.14.0;onnx-pb-rs - no_fix;onnx-pb - no_fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |