GHSA-83g7-8fch-p37m

Suggest an improvement
Source
https://github.com/advisories/GHSA-83g7-8fch-p37m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-83g7-8fch-p37m/GHSA-83g7-8fch-p37m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-83g7-8fch-p37m
Aliases
Published
2022-11-26T03:30:27Z
Modified
2023-11-08T04:10:54.247844Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
PaddlePaddle vulnerable to code injection via winstr
Details

In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.

Database specific
{
    "nvd_published_at": "2022-11-26T02:15:00Z",
    "github_reviewed_at": "2022-11-30T21:19:52Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-94"
    ]
}
References

Affected packages

PyPI / paddlepaddle

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4

Affected versions

1.*

1.8.5

2.*

2.0.0b0
2.0.0rc0
2.0.0rc1
2.0.0
2.0.1
2.0.2
2.1.0
2.1.1
2.1.2
2.1.3
2.2.0rc0
2.2.0
2.2.1
2.2.2
2.3.0rc0
2.3.0
2.3.1
2.3.2
2.4.0rc0