TorchServe Fixes issue in Allowing Unauthorized Access to Models
CVE-2024-35198
Key Information:
- Vendor
- Pytorch
- Status
- Serve
- Vendor
- CVE Published:
- 19 July 2024
Summary
TorchServe, a tool designed to simplify the deployment and scaling of PyTorch models, houses a vulnerability that allows for bypassing of its allowed_urls security checks. Specifically, if a URL contains characters such as '..', it can evade the configuration that restricts downloadable resources, enabling unauthorized access to model files stored in the model store. This circumvention not only compromises the integrity of model downloads but also raises significant security concerns for users employing Deep Learning Containers via Amazon SageMaker and EKS, which remain unaffected by this flaw. The vulnerability has been addressed in TorchServe version 0.11.0, where improvements ensure that URLs are appropriately validated, preventing such circumventions. Users are strongly encouraged to upgrade to the latest version to maintain security.
Affected Version(s)
serve >= 0.4.2, < 0.11.0
References
CVSS V3.1
Timeline
Vulnerability published