Описание
ZenML version 0.83.1 is affected by a path traversal vulnerability in the PathMaterializer class. The load function uses is_path_within_directory to validate files during data.tar.gz extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
Ссылки
- Patch
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 0.83.1 (включая) до 0.84.2 (исключая)
cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
EPSS
Процентиль: 23%
0.00075
Низкий
6.3 Medium
CVSS3
7.8 High
CVSS3
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 6.3
github
4 месяца назад
ZenML is vulnerable to Path Traversal through its `PathMaterializer` class
EPSS
Процентиль: 23%
0.00075
Низкий
6.3 Medium
CVSS3
7.8 High
CVSS3
Дефекты
CWE-22