Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-35198
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
TorchServe bypass allowed_urls configuration
Source: NVD (National Vulnerability Database)
Vulnerability Description
TorchServe is a flexible and easy-to-use tool for serving and scaling PyTorch models in production. TorchServe 's check on allowed_urls configuration can be by-passed if the URL contains characters such as ".." but it does not prevent the model from being downloaded into the model store. Once a file is downloaded, it can be referenced without providing a URL the second time, which effectively bypasses the allowed_urls security check. Customers using PyTorch inference Deep Learning Containers (DLC) through Amazon SageMaker and EKS are not affected. This issue in TorchServe has been fixed by validating the URL without characters such as ".." before downloading see PR #3082. TorchServe release 0.11.0 includes the fix to address this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用不正确的解析名称或索引
Source: NVD (National Vulnerability Database)
Vulnerability Title
TorchServe 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TorchServe是pytorch开源的一个灵活且易于使用的工具。用于在生产中提供和扩展 PyTorch 模型。 TorchServe 0.4.2版本存在安全漏洞,该漏洞源于URL包含..之类的字符,可绕过TorchServe对allowed_urls配置的检查。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
pytorchserve >= 0.4.2, < 0.11.0 -
II. Public POCs for CVE-2024-35198
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-35198
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-35198

No comments yet


Leave a comment