Platform
python
Component
onnx
Fixed in
1.15.1
1.16.0
CVE-2024-27318 is a Directory Traversal vulnerability discovered in ONNX Runtime versions up to and including 1.9.0. This vulnerability allows attackers to potentially read arbitrary files on the system by manipulating the external_data field within tensor protos. The root cause lies in insufficient validation of file paths, enabling a bypass of a previous patch intended to address CVE-2022-25882. A fix is available in version 1.16.0.
Successful exploitation of CVE-2024-27318 allows an attacker to read sensitive files outside the intended model directory. This could include configuration files, credentials, or other data that could be used to compromise the system or network. The impact is particularly severe in environments where ONNX Runtime is used to process untrusted data, such as in machine learning inference pipelines. An attacker could potentially gain access to the underlying file system, leading to data exfiltration or further system compromise. The bypass nature of this vulnerability, circumventing a previous fix, increases the likelihood of exploitation.
CVE-2024-27318 was publicly disclosed on February 23, 2024. It is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are emerging, indicating a potential for rapid exploitation. The bypass nature of this vulnerability, related to CVE-2022-25882, suggests that attackers may be actively seeking to exploit it.
Exploit Status
EPSS
0.41% (61% percentile)
CVSS Vector
The primary mitigation for CVE-2024-27318 is to upgrade to ONNX Runtime version 1.16.0 or later. If upgrading is not immediately feasible, consider implementing strict file access controls to limit the directories accessible by ONNX Runtime processes. Additionally, carefully validate any external data used by ONNX Runtime to ensure it does not contain malicious file paths. While a WAF is unlikely to directly address this vulnerability, input validation at the application layer is crucial. There are no specific Sigma or YARA rules readily available for this vulnerability, emphasizing the need for robust input validation.
Actualice la biblioteca onnx a una versión posterior a la 1.15.0. Esto se puede hacer usando el gestor de paquetes pip con el comando: `pip install --upgrade onnx`. Asegúrese de verificar que la actualización se haya realizado correctamente y que la nueva versión esté en uso.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-27318 is a Directory Traversal vulnerability affecting ONNX Runtime versions up to 1.9.0, allowing attackers to read files outside the intended model directory.
You are affected if you are using ONNX Runtime versions 1.9.0 or earlier. Upgrade to version 1.16.0 or later to resolve the vulnerability.
Upgrade to ONNX Runtime version 1.16.0 or later. If upgrading is not possible, implement strict file access controls and validate external data.
Public proof-of-concept exploits are emerging, indicating a potential for active exploitation.
Refer to the ONNX Runtime GitHub repository for updates and advisories: https://github.com/microsoft/onnxruntime
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.