Directory Traversalonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Directory Traversal via the save_external_data function. An attacker can overwrite arbitrary files by supplying crafted values to the external_data.location parameter containing traversal sequences, thereby bypassing intended directory restrictions. This could lead to overwriting script files, configuration files, or SSH keys, or corruption of sensitive files based on the permissions of the running process.
How to fix Directory Traversal? A fix was pushed into the master branch but not yet published.
| |
Directory Traversalonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Directory Traversal via the download_model function. An attacker can overwrite files in the user's directory by exploiting inadequate prevention of path traversal attacks in malicious tar files.
How to fix Directory Traversal? Upgrade onnx to version 1.17.0 or higher.
| |
Path Traversalonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Path Traversal through the download_model_with_test_data function, does not adequately sanitize malicious tar files. An attacker can overwrite any file on the system by specifying an absolute path in a malicious tar file.
Note:
This section will highlight some tangible impact:
SSH Access On servers that have SSH enabled, an attacker may be able to inject their own public RSA key into the authorized_keys file, leading to remote code execution.
Web Servers On servers hosting web servers, various vulnerabilities can be exploited. On PHP or JSP server, remote code execution may be possible via uploading a webshell. On other servers an HTML file can be uploaded to achieve Cross-site Scripting (XSS)
How to fix Path Traversal? Upgrade onnx to version 1.16.2 or higher.
| |
Directory Traversalonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Directory Traversal due to unsafe path manipulation in external_data_helper.py. An attacker can traverse up the directory tree from a base path to expose files outside the intended working directory. This is a bypass for the previously reported CVE-2022-25882.
How to fix Directory Traversal? Upgrade onnx to version 1.16.0 or higher.
| |
Out-of-bounds Readonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Out-of-bounds Read due to the ONNX_ASSERT and ONNX_ASSERTM functions having an off-by-one string copy.
How to fix Out-of-bounds Read? Upgrade onnx to version 1.16.0 or higher.
| |