漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Path Traversal in zenml-io/zenml
Vulnerability Description
ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten.
CVSS Information
N/A
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
ZenML 安全漏洞
Vulnerability Description
ZenML是ZenML开源的一个可扩展的开源 MLOps 框架,用于创建可移植的、可用于生产的机器学习管道。 ZenML 0.83.1版本存在安全漏洞,该漏洞源于PathMaterializer类在data.tar.gz解压过程中验证文件时未能有效检测符号链接和硬链接,可能导致任意文件写入和任意命令执行。
CVSS Information
N/A
Vulnerability Type
N/A