Lucene search

K
cve6f8de1f0-f67e-45a6-b68f-98777fdb759cCVE-2024-27318
HistoryFeb 23, 2024 - 6:15 p.m.

CVE-2024-27318

2024-02-2318:15:50
CWE-22
6f8de1f0-f67e-45a6-b68f-98777fdb759c
web.nvd.nist.gov
57
cve-2024-27318
onnx
vulnerability
directory traversal
external_data
tensor proto
bypass
patch
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.2%

Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "packageName": "onnx",
    "product": "onnx",
    "repo": "https://github.com/onnx/onnx",
    "vendor": "onnx",
    "versions": [
      {
        "lessThanOrEqual": "1.15.0",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.2%