Path Traversal Affecting onnx package, versions [,1.16.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-ONNX-7231121
  • published 10 Jun 2024
  • disclosed 6 Jun 2024
  • credit sunrisexu

How to fix?

Upgrade onnx to version 1.16.2 or higher.

Overview

onnx is an Open Neural Network Exchange

Affected versions of this package are vulnerable to Path Traversal through the download_model_with_test_data function, does not adequately sanitize malicious tar files. An attacker can overwrite any file on the system by specifying an absolute path in a malicious tar file.

Note:

This section will highlight some tangible impact:

  1. SSH Access On servers that have SSH enabled, an attacker may be able to inject their own public RSA key into the authorized_keys file, leading to remote code execution.

  2. Web Servers On servers hosting web servers, various vulnerabilities can be exploited. On PHP or JSP server, remote code execution may be possible via uploading a webshell. On other servers an HTML file can be uploaded to achieve Cross-site Scripting (XSS)

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
8.8 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

8.8 high