CVE-2024-10372

A vulnerability classified as problematic was found in chidiwilliams buzz 1.1.0. This vulnerability affects the function download_model of the file buzz/model_loader.py. The manipulation leads to insecure temporary file. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.281764 Permissions Required VDB Entry
https://vuldb.com/?id.281764 Third Party Advisory VDB Entry
https://vuldb.com/?submit.425441 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:chidiwilliams:buzz:1.1.0:*:*:*:*:*:*:*

History

06 Nov 2024, 16:14

Type Values Removed Values Added
CPE cpe:2.3:a:chidiwilliams:buzz:1.1.0:*:*:*:*:*:*:*
CVSS v2 : 3.5
v3 : 4.5
v2 : 3.5
v3 : 3.6
References () https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md - () https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.281764 - () https://vuldb.com/?ctiid.281764 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.281764 - () https://vuldb.com/?id.281764 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.425441 - () https://vuldb.com/?submit.425441 - Third Party Advisory, VDB Entry
First Time Chidiwilliams buzz
Chidiwilliams

25 Oct 2024, 12:56

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en chidiwilliams buzz 1.1.0. Esta vulnerabilidad afecta a la función download_model del archivo buzz/model_loader.py. La manipulación genera un archivo temporal inseguro. Es posible lanzar el ataque en el host local. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. El exploit ha sido revelado al público y puede usarse. El proveedor fue contactado con anticipación sobre esta revelación pero no respondió de ninguna manera.

25 Oct 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-25 02:15

Updated : 2024-11-06 16:14


NVD link : CVE-2024-10372

Mitre link : CVE-2024-10372

CVE.ORG link : CVE-2024-10372


JSON object : View

Products Affected

chidiwilliams

  • buzz
CWE
CWE-377

Insecure Temporary File