Server-Side Request Forgery (SSRF) The advisory has been revoked - it doesn't affect any version of package wandb  (opens in a new tab)


Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-WANDB-6860240
  • published16 May 2024
  • disclosed16 May 2024
  • credithiu240900

Introduced: 16 May 2024

CVE-2024-4642  (opens in a new tab)
CWE-918  (opens in a new tab)

Amendment

This was deemed not a vulnerability.

Overview

wandb is an A CLI and library for interacting with the Weights and Biases API.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to improper handling of HTTP 302 redirects. An attacker can access internal HTTP(s) servers by exploiting this vulnerability through the 'User settings -> Webhooks' function.

Note:

This advisory was revoked as this is not a vulnerability in the SDK, but in the backend server code.

References