A vulnerability classified as problematic was found in chidiwilliams buzz 1.1.0. This vulnerability affects the function download_model of the file buzz/model_loader.py. The manipulation leads to insecure temporary file. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.281764 | Permissions Required VDB Entry |
https://vuldb.com/?id.281764 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.425441 | Third Party Advisory VDB Entry |
Configurations
History
06 Nov 2024, 16:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:chidiwilliams:buzz:1.1.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 3.6 |
References | () https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.281764 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.281764 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.425441 - Third Party Advisory, VDB Entry | |
First Time |
Chidiwilliams buzz
Chidiwilliams |
25 Oct 2024, 12:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Oct 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-25 02:15
Updated : 2024-11-06 16:14
NVD link : CVE-2024-10372
Mitre link : CVE-2024-10372
CVE.ORG link : CVE-2024-10372
JSON object : View
Products Affected
chidiwilliams
- buzz
CWE
CWE-377
Insecure Temporary File