First published: Wed Jan 25 2023(Updated: )
Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd"
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Onnx | <1.13.0 | |
pip/onnx | <1.13.0 | 1.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25882 is classified as a medium severity vulnerability due to its potential for directory traversal attacks.
To fix CVE-2022-25882, upgrade the onnx package to version 1.13.0 or later.
CVE-2022-25882 affects all versions of the onnx package before 1.13.0.
CVE-2022-25882 enables directory traversal attacks which can allow access to sensitive files outside the application’s directory.
CVE-2022-25882 is not specific to any operating system; it affects the onnx package regardless of the platform.