漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Cleartext storage of HMAC signing key in Amazon SageMaker Python SDK ModelBuilder/Serve path
Vulnerability Description
Cleartext storage of sensitive information in the ModelBuilder/Serve component in Amazon SageMaker Python SDK before v2.257.2 and v3 before v3.8.0 might allow a remote authenticated actor to extract the HMAC signing key from SageMaker API responses and forge valid integrity signatures for specially crafted model artifacts, achieving code execution in inference containers. This issue requires a remote authenticated actor with permissions to call SageMaker describe APIs and S3 write access to the model artifact path. To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any models previously created with ModelBuilder using the updated SDK.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
敏感数据的明文存储
Vulnerability Title
Amazon SageMaker Python SDK 安全漏洞
Vulnerability Description
Amazon SageMaker Python SDK是美国亚马逊(Amazon)公司的一个构件、训练和部署机器学习模型的开发者工具包。 Amazon SageMaker Python SDK v2.257.2之前版本和v3.8.0之前版本存在安全漏洞,该漏洞源于ModelBuilder/Serve组件明文存储敏感信息,可能导致远程认证攻击者从SageMaker API响应中提取HMAC签名密钥并伪造有效完整性签名,实现推理容器中的代码执行。
CVSS Information
N/A
Vulnerability Type
N/A