CVE-2024-1603

paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file.
References
Link Resource
https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e Exploit Issue Tracking Third Party Advisory
https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:paddlepaddle:paddlepaddle:2.6.0:*:*:*:*:*:*:*

History

24 Jan 2025, 18:22

Type Values Removed Values Added
CPE cpe:2.3:a:paddlepaddle:paddlepaddle:2.6.0:*:*:*:*:*:*:*
References () https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e - () https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e - Exploit, Issue Tracking, Third Party Advisory
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : 8.2
v2 : unknown
v3 : 7.5
First Time Paddlepaddle
Paddlepaddle paddlepaddle

21 Nov 2024, 08:50

Type Values Removed Values Added
Summary
  • (es) paddlepaddle/paddle 2.6.0 permite la lectura de archivos arbitrarios a través de paddle.vision.ops.read_file.
References () https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e - () https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e -

24 Mar 2024, 00:15

Type Values Removed Values Added
Summary (en) confirmed (en) paddlepaddle/paddle 2.6.0 allows arbitrary file read via paddle.vision.ops.read_file.

23 Mar 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-23 19:15

Updated : 2025-01-24 18:22


NVD link : CVE-2024-1603

Mitre link : CVE-2024-1603

CVE.ORG link : CVE-2024-1603


JSON object : View

Products Affected

paddlepaddle

  • paddlepaddle
CWE
CWE-73

External Control of File Name or Path

NVD-CWE-Other