Directory Traversalonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Directory Traversal via the save_external_data function. An attacker can overwrite arbitrary files by supplying crafted values to the external_data.location parameter containing traversal sequences, thereby bypassing intended directory restrictions. This could lead to overwriting script files, configuration files, or SSH keys, or corruption of sensitive files based on the permissions of the running process.
How to fix Directory Traversal? A fix was pushed into the master branch but not yet published.
| |
Directory Traversalonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Directory Traversal via the download_model function. An attacker can overwrite files in the user's directory by exploiting inadequate prevention of path traversal attacks in malicious tar files.
How to fix Directory Traversal? Upgrade onnx to version 1.17.0 or higher.
| |
Path Traversalonnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Path Traversal through the download_model_with_test_data function, does not adequately sanitize malicious tar files. An attacker can overwrite any file on the system by specifying an absolute path in a malicious tar file.
Note:
This section will highlight some tangible impact:
SSH Access On servers that have SSH enabled, an attacker may be able to inject their own public RSA key into the authorized_keys file, leading to remote code execution.
Web Servers On servers hosting web servers, various vulnerabilities can be exploited. On PHP or JSP server, remote code execution may be possible via uploading a webshell. On other servers an HTML file can be uploaded to achieve Cross-site Scripting (XSS)
How to fix Path Traversal? Upgrade onnx to version 1.16.2 or higher.
| |