GHSA-rpx7-33j2-xx9x

Suggest an improvement
Source
https://github.com/advisories/GHSA-rpx7-33j2-xx9x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-rpx7-33j2-xx9x/GHSA-rpx7-33j2-xx9x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rpx7-33j2-xx9x
Related
Published
2022-02-15T01:57:18Z
Modified
2024-12-04T05:41:55.301104Z
Severity
  • 2.0 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Arbitrary file deletion in NeMo ASR webapp
Details

Description

NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the "../" structure when admin privileges are available.

CVSS Score = 2.0 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

Impact

When the optional tool ASR Webapp (https://github.com/NVIDIA/NeMo/tree/main/tools/asr_webapp) is used prior to commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, some interfaces do not verify user input. Malicious attackers can construct malicious requests to delete any directory through the "../" structure.

The vulnerability affects only cases where this particular web app is started by a user with superuser permissions. The web application is not a part of the regular pip release or the corresponding container, and impacts only users that clone the repository in its entirety and execute the web app (while also possessing superuser permissions).

Patches

This vulnerability has been patched via https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, which is effectively any clone of the repository post r1.5.1 branch. Since the web app is not distributed via pip release or container, users who clone the main branch post this commit will possess the patch.

Workarounds

The changes in commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0 can be applied to any version of the web app without any adverse effect.

Additional Information

Exploit Found on: 2021.12.16 Exploit Found by: @haby0

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2022-01-07T22:34:36Z"
}
References

Affected packages

PyPI / nemo-toolkit

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.0

Affected versions

0.*

0.8
0.8.1
0.8.2
0.9.0
0.10.0b0
0.10.0b1
0.10.0b2
0.10.0b3
0.10.0b4
0.10.0b5
0.10.0b6
0.10.0b7
0.10.0b8
0.10.0b9
0.10.0b10
0.10.0
0.10.1
0.11.0b1
0.11.0b2
0.11.0b3
0.11.0b4
0.11.0b5
0.11.0b6
0.11.0b8
0.11.0b10
0.11.0b11
0.11.0b12
0.11.0b14
0.11.0

1.*

1.0.0a4
1.0.0b0
1.0.0b1
1.0.0b2
1.0.0b3
1.0.0rc1
1.0.0
1.0.1
1.0.2
1.1.0
1.2.0
1.3.0
1.4.0
1.5.0
1.5.1