Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd"
References
Configurations
History
21 Nov 2024, 06:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856 - Exploit, Third Party Advisory | |
References | () https://github.com/onnx/onnx/blob/96516aecd4c110b0ac57eba08ac236ebf7205728/onnx/checker.cc%23L129 - Broken Link | |
References | () https://github.com/onnx/onnx/commit/f369b0e859024095d721f1d1612da5a8fa38988d - Patch, Third Party Advisory | |
References | () https://github.com/onnx/onnx/issues/3991 - Exploit, Third Party Advisory | |
References | () https://github.com/onnx/onnx/pull/4400 - Patch, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479 - Exploit, Third Party Advisory |
Information
Published : 2023-01-26 21:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-25882
Mitre link : CVE-2022-25882
CVE.ORG link : CVE-2022-25882
JSON object : View
Products Affected
linuxfoundation
- onnx
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')