CVE-2023-43654
Scores
EPSS
Percentile: 91.7%
CVSS
CVSS Score: 9.8/10
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Privileges Required
None (N)
Describes the level of privileges an attacker must possess
User Interaction
None (N)
Captures the requirement for a human user participation
Scope
Unchanged (U)
Determines if a successful attack impacts components beyond the vulnerable component
Confidentiality Impact
High (H)
Measures the impact to the confidentiality of information
Integrity Impact
High (H)
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
High (H)
Measures the impact to the availability of the impacted component
Description
TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
Scaner-VS 7 — a modern vulnerability management solution
Sources
CWEs
Related Vulnerabilities
Exploits
Exploit ID: CVE-2023-43654
Source: github-poc
Vulnerable Software (1)
Type: Configuration
Vendor: *
Product: torchserve
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:pytorch:torchserve:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.8.2", "versionStartIncluding": "0.1.0", "vulnerable": true }...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:pytorch:torchserve:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.8.2", "versionStartIncluding": "0.1.0", "vulnerable": true } ], "operator": "OR"}
Source: nvd