PyTorch Serve Server-Side Request Forgery

critical Web App Scanning Plugin ID 114228

Synopsis

PyTorch Serve Server-Side Request Forgery

Description

PyTorch Serve version prior to 0.8.2 and versions using a default configuration are vulnerable to a Server-Side Request Forgery allowing an unauthenticated user to write a file to disk, that can lead to an arbitrary code execution.

Solution

Upgrade to PyTorch Serve 0.8.2 and set parameter 'allowed_urls' in 'config.properties' file.

See Also

https://github.com/pytorch/serve/security/advisories/GHSA-8fxr-qfr9-p34w

https://www.oligo.security/blog/shelltorch-torchserve-ssrf-vulnerability-cve-2023-43654

Plugin Details

Severity: Critical

ID: 114228

Type: remote

Published: 3/13/2024

Updated: 3/13/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-43654

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2023-43654

Vulnerability Information

CPE: cpe:2.3:a:pytorch:torchserve:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/28/2023

Vulnerability Publication Date: 9/28/2023

Reference Information

CVE: CVE-2023-43654