Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vv9c-xxg7-wmv7

Опубликовано: 18 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

InvokeAI has External Control of File Name or Path

Path Traversal Vulnerability in InvokeAI

A path traversal vulnerability in InvokeAI (versions < 6.7.0) allows an unauthenticated remote attacker to read files outside the intended media directory via the bulk downloads API.

The endpoint accepts a user-controlled file/item name and concatenates it into a filesystem path without proper canonicalization or allow-listing. By supplying sequences such as ../ (or absolute paths), an attacker can cause the server to traverse directories and return arbitrary files.

In certain storage or back-end configurations, abusing attacker-controlled paths can also lead to unintended overwriting or deletion of files referenced by the crafted path.

The issue is fixed in 6.7.0, which normalizes and validates input paths and rejects traversal attempts.

Affected versions: < 6.7.0 Patched version: 6.7.0

Пакеты

Наименование

invokeai

pip
Затронутые версииВерсия исправления

< 6.7.0

6.7.0

EPSS

Процентиль: 29%
0.00106
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-22
CWE-73

Связанные уязвимости

CVSS3: 9.8
nvd
5 месяцев назад

A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.

EPSS

Процентиль: 29%
0.00106
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-22
CWE-73