# N/A
## 概述
Ollama在0.1.34之前的版本在获取模型路径时未能验证摘要(sha256格式,64个十六进制字符)的格式,导致无法正确处理某些测试用例。
## 影响版本
- 0.1.34之前的版本
## 细节
在处理`TestGetBlobsPath`测试用例时,Ollama未能正确处理以下情况:
- 摘要长度少于64个十六进制字符
- 摘要长度多于64个十六进制字符
- 摘要以`../`子字符串开头
## 影响
导致潜在的路径处理错误,可能引发安全问题。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Path traversal in Ollama with rogue registry server | https://github.com/Bi0x/CVE-2024-37032 | POC详情 |
2 | CVE-2024-37032 scanner | https://github.com/ahboon/CVE-2024-37032-scanner | POC详情 |
3 | CVE-2024-45436 | https://github.com/pankass/CVE-2024-37032_CVE-2024-45436 | POC详情 |
4 | Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-37032.yaml | POC详情 |
5 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%BA%E5%B7%A5%E6%99%BA%E8%83%BD%E6%BC%8F%E6%B4%9E/Ollama%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E8%87%B4%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-37032.md | POC详情 |
标题: Probllama in Ollama: A tale of a yet another RCE vulnerability (CVE-2024-37032) - vsociety -- 🔗来源链接
标签: