漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Code injection via unsafe YAML loading
Vulnerability Description
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
Sockeye 代码注入漏洞
Vulnerability Description
Sockeye是一个基于 PyTorch 的用于神经机器翻译的开源序列到序列框架。 Sockeye 存在代码注入漏洞,该漏洞源于Sockeye使用YAML在磁盘上存储模型和数据配置,Sockeye2.3.24以下的版本使用不安全的YAML加载,它可以执行嵌入在配置文件中的任意代码。攻击者可利用该漏洞可以将恶意代码添加到经过训练的模型的配置文件中,并试图说服用户下载并运行它。
CVSS Information
N/A
Vulnerability Type
N/A