Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62rc-f4v9-h543

Опубликовано: 02 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 5.9

Описание

SageMaker Python SDK has Insecure TLS Configuration

Summary

SageMaker Python SDK is an open source library for training and deploying machine learning models on Amazon SageMaker. An issue where SSL certificate verification was globally disabled in the Triton Python backend has been found.

Impact

Arbitrary Code Execution: Disabling SSL verification allows third parties to intercept HTTPS traffic and replace models or dependencies with inappropriate versions. This could lead to remote code execution in the Triton container.

Impacted versions

  • SageMaker Python SDK v3 < v3.1.1
  • SageMaker Python SDK v2 < v2.256.0

Patches

This issue has been addressed in SageMaker Python SDK version v3.1.1 and v2.256.0. It is recommended to upgrade to the latest version immediately and ensure any forked or derivative code is patched to incorporate the new fixes.

Workarounds

Customers using self-signed certificates for internal model downloads should add their private Certificate Authority (CA) certificate to the container image rather than relying on the SDK’s previous insecure configuration. This opt-in approach maintains security while accommodating internal trusted domains.

References

If there are any questions or comments about this advisory, contact AWS Security via the vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.

Пакеты

Наименование

sagemaker

pip
Затронутые версииВерсия исправления

>= 3.0, < 3.1.1

3.1.1

Наименование

sagemaker

pip
Затронутые версииВерсия исправления

< 2.256.0

2.256.0

EPSS

Процентиль: 0%
0.00006
Низкий

8.7 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-295
CWE-599

Связанные уязвимости

CVSS3: 5.9
nvd
6 дней назад

Amazon SageMaker Python SDK before v3.1.1 or v2.256.0 disables TLS certificate verification for HTTPS connections made by the service when a Triton Python model is imported, incorrectly allowing for requests with invalid and self-signed certificates to succeed.

EPSS

Процентиль: 0%
0.00006
Низкий

8.7 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-295
CWE-599