Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q92x-2x5g-h365

Опубликовано: 05 окт. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.3

Описание

ZenML is vulnerable to Path Traversal through its PathMaterializer class

ZenML version 0.83.1 is affected by a path traversal vulnerability in the PathMaterializer class. The load function uses is_path_within_directory to validate files during data.tar.gz extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.

Пакеты

Наименование

zenml

pip
Затронутые версииВерсия исправления

>= 0.81.0, < 0.84.2

0.84.2

EPSS

Процентиль: 23%
0.00075
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.8
nvd
4 месяца назад

ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.

EPSS

Процентиль: 23%
0.00075
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-22