CVE-2024-8374

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-8374
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-8374.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-8374
Published
2024-09-03T10:15:06Z
Modified
2024-09-04T01:55:31.780355Z
Summary
[none]
Details

UltiMaker Cura slicer versions 5.7.0-beta.1 through 5.7.2 are vulnerable to code injection via the 3MF format reader (/plugins/ThreeMFReader.py). The vulnerability arises from improper handling of the droptobuildplate property within 3MF files, which are ZIP archives containing the model data. When a 3MF file is loaded in Cura, the value of the droptobuildplate property is passed to the Python eval() function without proper sanitization, allowing an attacker to execute arbitrary code by crafting a malicious 3MF file. This vulnerability poses a significant risk as 3MF files are commonly shared via 3D model databases.

References

Affected packages

Git / github.com/ultimaker/cura

Affected ranges

Type
GIT
Repo
https://github.com/ultimaker/cura
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.15.05.90
1.15.06.01
1.15.06.02
1.15.06.03

15.*

15.05.90
15.06.01
15.06.02
15.06.03

2.*

2.1.0
2.3-rc1
2.3.0
2.4.0
2.5.0
2.6.0
2.6.1
2.7.0

3.*

3.0.3
3.1.0
3.2.1
3.3.0
3.3.1
3.4.1
3.5.1
3.6.0

4.*

4.0-beta
4.0.0
4.1.0
4.10-beta
4.10.0
4.11-beta
4.11.0
4.12-beta
4.12.0
4.12.1
4.13-beta
4.13.0
4.13.1
4.2-beta
4.2.0
4.2.1
4.3-beta
4.3.0
4.4-beta-pre-release
4.4.0
4.4.1
4.5.0
4.6-beta
4.6.0
4.6.1
4.6.2
4.7-beta
4.7.0
4.7.1
4.8-beta
4.8.0
4.9-beta
4.9.0

5.*

5.0-beta
5.0.0
5.0.99
5.1-beta
5.1.0
5.1.1
5.2.0
5.2.0-beta
5.2.0-beta.1
5.2.1
5.2.101
5.2.99
5.3.0
5.3.0-beta
5.3.0-beta.1
5.3.0-beta.2
5.3.1
5.4.0
5.4.0-beta.1
5.5.0
5.5.0-beta.1
5.6.0
5.6.0-beta.1
5.6.0-beta.2
5.7.0
5.7.0-alpha.0
5.7.0-beta.1
5.7.1
5.7.2-RC2
5.8.0-beta.1-RC1

Other

Arachne_engine_alpha
Arachne_engine_beta
Arachne_engine_beta_2
nightly

v0.*

v0.3
v0.4
v0.5
v0.5.1
v0.6

v2.*

v2.0
v2.1

v3.*

v3.0.3
v3.1.0-beta

v4.*

v4.4-beta
v4.4.1
v4.5-beta