Логотип exploitDog
bind:CVE-2025-8406
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-8406

Количество 2

Количество 2

nvd логотип

CVE-2025-8406

4 месяца назад

ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-q92x-2x5g-h365

4 месяца назад

ZenML is vulnerable to Path Traversal through its `PathMaterializer` class

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-8406

ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.

CVSS3: 7.8
0%
Низкий
4 месяца назад
github логотип
GHSA-q92x-2x5g-h365

ZenML is vulnerable to Path Traversal through its `PathMaterializer` class

CVSS3: 6.3
0%
Низкий
4 месяца назад

Уязвимостей на страницу