CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability. Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://github.com/cvat-ai/cvat/commit/6fad1764efd922d99dbcda28c4ee72d071aa5a07 | Patch Third Party Advisory |
https://github.com/cvat-ai/cvat/security/advisories/GHSA-7vpj-j5xv-29pr | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-08-01 20:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-31188
Mitre link : CVE-2022-31188
CVE.ORG link : CVE-2022-31188
JSON object : View
Products Affected
cvat
- cvat
CWE
CWE-918
Server-Side Request Forgery (SSRF)