Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade onnx
to version 1.16.2 or higher.
onnx is an Open Neural Network Exchange
Affected versions of this package are vulnerable to Path Traversal through the download_model_with_test_data
function, does not adequately sanitize malicious tar files. An attacker can overwrite any file on the system by specifying an absolute path in a malicious tar file.
Note:
This section will highlight some tangible impact:
SSH Access On servers that have SSH enabled, an attacker may be able to inject their own public RSA key into the authorized_keys
file, leading to remote code execution.
Web Servers On servers hosting web servers, various vulnerabilities can be exploited. On PHP or JSP server, remote code execution may be possible via uploading a webshell. On other servers an HTML file can be uploaded to achieve Cross-site Scripting (XSS)