OS Command Injection Affecting paddlepaddle package, versions [,2.6.1)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-PADDLEPADDLE-6419228
- published 8 Mar 2024
- disclosed 7 Mar 2024
- credit Nguyen Cong Vinh
How to fix?
Upgrade paddlepaddle
to version 2.6.1 or higher.
Overview
paddlepaddle is a Parallel Distributed Deep Learning
Affected versions of this package are vulnerable to OS Command Injection due to improper input validation in the paddle.utils.download._wget_download
function. An attacker can execute arbitrary commands by crafting malicious input that bypasses the filter.
Note: Depending on the context in which this code is used, this could lead to unauthorized access, data loss, or other potentially harmful consequences.
PoC
from paddle import utils
utils.download._wget_download("https://; sleep 10", "test") # will delay 10s
References
CVSS Scores
version 3.1