First published: Fri Feb 23 2024(Updated: )
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.
Credit: 6f8de1f0-f67e-45a6-b68f-98777fdb759c 6f8de1f0-f67e-45a6-b68f-98777fdb759c
Affected Software | Affected Version | How to fix |
---|---|---|
pip/onnx | <=1.15.0 | 1.16.0 |
ONNX | <1.16.0 | |
Fedora | =39 | |
Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27318 has been classified with moderate severity due to its potential for directory traversal exploitation.
To mitigate CVE-2024-27318, upgrade the onnx package to version 1.16.0 or later.
CVE-2024-27318 affects all versions of the onnx package up to and including 1.15.0.
CVE-2024-27318 involves a directory traversal vulnerability that allows access to files outside the designated directories.
Yes, CVE-2024-27318 may lead to unauthorized file access, posing a risk of data leakage.