CVE-2024-5187

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-5187
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5187.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-5187
Aliases
Related
Published
2024-06-06T19:16:06Z
Modified
2024-10-23T17:57:28.590942Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability in the download_model_with_test_data function of the onnx/onnx framework, version 1.16.0, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability enables attackers to overwrite any file on the system, potentially leading to remote code execution, deletion of system, personal, or application files, thus impacting the integrity and availability of the system. The issue arises from the function's handling of tar file extraction without performing security checks on the paths within the tar file, as demonstrated by the ability to overwrite the /home/kali/.ssh/authorized_keys file by specifying an absolute path in the malicious tar file.

References

Affected packages

Debian:11 / onnx

Package

Name
onnx
Purl
pkg:deb/debian/onnx?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.0+dfsg-3
1.7.0+dfsg-3.1
1.12.0-1~exp1
1.12.0-1
1.12.0-2
1.13.1-1
1.13.1-2
1.13.1-3
1.14.1-1
1.14.1-2
1.14.1-2.1~exp1
1.14.1-2.1
1.16.1-1
1.16.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / onnx

Package

Name
onnx
Purl
pkg:deb/debian/onnx?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.12.0-2
1.13.1-1
1.13.1-2
1.13.1-3
1.14.1-1
1.14.1-2
1.14.1-2.1~exp1
1.14.1-2.1
1.16.1-1
1.16.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / onnx

Package

Name
onnx
Purl
pkg:deb/debian/onnx?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.12.0-2
1.13.1-1
1.13.1-2
1.13.1-3
1.14.1-1
1.14.1-2
1.14.1-2.1~exp1
1.14.1-2.1
1.16.1-1
1.16.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}