VYPR
High severityOSV Advisory· Published Nov 15, 2023· Updated Aug 2, 2024

Using MLeap for loading a saved model (zip archive) can lead to path traversal/arbitrary file creation and possibly remote code execution.

CVE-2023-5245

Description

FileUtil.extract() enumerates all zip file entries and extracts each file without validating whether file paths in the archive are outside the intended directory.

When creating an instance of TensorflowModel using the saved_model format and an exported tensorflow model, the apply() function invokes the vulnerable implementation of FileUtil.extract().

Arbitrary file creation can directly lead to code execution

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ml.combust.mleap:mleap-runtime_2.12Maven
< 0.23.10.23.1

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.