Learn about CVE-2023-48299 impacting TorchServe, a tool for PyTorch models, with a ZipSlip vulnerability allowing malicious file extraction in versions 0.1.0 to 0.9.0.
This article provides an overview of CVE-2023-48299, a vulnerability affecting TorchServe, a tool for serving and scaling PyTorch models.
Understanding CVE-2023-48299
CVE-2023-48299 is a ZipSlip vulnerability in TorchServe, impacting versions starting from 0.1.0 up to version 0.9.0. This vulnerability allows for the extraction of potentially harmful files to any location on the filesystem, posing a security risk.
What is CVE-2023-48299?
TorchServe, used for deploying PyTorch models, was exposed to a ZipSlip vulnerability. By uploading malicious archives via the model/workflow management API, attackers could hide harmful code in public models, risking compromise on machines running TorchServe.
The Impact of CVE-2023-48299
The ZipSlip vulnerability in TorchServe could enable attackers to plant malicious files within extracted archives, potentially leading to unauthorized system access and execution of harmful code.
Technical Details of CVE-2023-48299
The vulnerability is rated with a CVSS base score of 5.3, indicating a medium severity level. It has a low attack complexity and is network exploitable. The affected TorchServe versions include those from 0.1.0 to 0.9.0.
Vulnerability Description
CVE-2023-48299 results from improper limitation of a pathname within the model/workflow management API, leading to unrestricted file extraction within TorchServe's permissions.
Affected Systems and Versions
TorchServe versions equal to or higher than 0.1.0 and less than 0.9.0 are vulnerable to the ZipSlip issue, potentially allowing for arbitrary file extraction beyond intended directories.
Exploitation Mechanism
Attackers could leverage the ZipSlip vulnerability by crafting archives with specially manipulated file paths, tricking TorchServe into extracting files to unauthorized locations.
Mitigation and Prevention
It is crucial to apply immediate security measures to protect against CVE-2023-48299 and prevent potential exploitation.
Immediate Steps to Take
Users are advised to update TorchServe to version 0.9.0 or later to mitigate the ZipSlip vulnerability. Additionally, exercise caution when handling and deploying models to ensure file integrity.
Long-Term Security Practices
Implement secure coding practices, perform regular security audits, and monitor for suspicious activities to enhance overall system security and reduce the risk of similar vulnerabilities.
Patching and Updates
Stay informed about security updates and patches released by TorchServe. Regularly check for new versions or patches to address any known vulnerabilities and ensure the safety of your deployments.