First published: Thu Mar 20 2025(Updated: )
A vulnerability in the `download_model` function of the onnx/onnx framework, before and including version 1.16.1, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability can be exploited by an attacker to overwrite files in the user's directory, potentially leading to remote command execution.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/onnx | <1.17.0 | 1.17.0 |
ONNX | <=1.16.1 | |
ONNX | <=1.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7776 has been classified as a high severity vulnerability due to its potential for arbitrary file overwrite.
To remediate CVE-2024-7776, upgrade to onnx version 1.17.0 or later.
CVE-2024-7776 affects ONNX versions up to and including 1.16.1.
CVE-2024-7776 allows for path traversal attacks through malicious tar files, resulting in arbitrary file overwrite.
Developers and users of ONNX versions 1.16.1 and earlier are at risk due to CVE-2024-7776.