Uploaded image for project: 'AI Platform Core Components'
  1. AI Platform Core Components
  2. AIPCC-9822

[BOT][Security] CWE-78 in common.py:4215

XMLWordPrintable

    • False
    • Hide

      None

      Show
      None
    • False

      Vulnerability Details

      CWE Type(s): CWE-78
      Severity: MEDIUM
      Team: Unassigned

      Location

      • File: benchmarks/dynamo/common.py
      • Lines: 4215

      Description

      Path Traversal in Output File Handling - Missing validation for path traversal patterns in user-controlled file paths (args.output and args.output_directory).

      Impact

      Attackers can write output files to arbitrary locations on the filesystem through path traversal sequences (.., ./, etc.).

      Root Cause

      Missing validation for path traversal patterns in user-controlled file paths. User-provided output filenames and directories are used without checking for traversal sequences.

      Fix Status

      MR Link: https://gitlab.com/redhat/rhel-ai/team-pytorch/pytorch/-/merge_requests/97
      Fix Branch: security-fix-Command_Injection-cwe78_common_path_traversal
      Status: IMPLEMENTED

      Related Exploit Files

      • test_cwe78_common.py

      Exploit Code Sample

      # Malicious path traversal attempts
      malicious_paths = [
          "../../../etc/passwd",
          "../../sensitive/file.txt",
          "./././../../../root",
          "normal/../../../etc/shadow"
      ]
      
      # Vulnerable code accepts these without validation
      output_filename = args.output  # No validation
      if args.output_directory:
          output_filename = os.path.join(args.output_directory, output_filename)
      

      References


      Generated by CI Security Bot

              Unassigned Unassigned
              rh-ee-rpunia Riya Punia
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: