Lucene search

K
osvGoogleOSV:GHSA-RPX7-33J2-XX9X
HistoryFeb 15, 2022 - 1:57 a.m.

Arbitrary file deletion in NeMo ASR webapp

2022-02-1501:57:18
Google
osv.dev
7
nemo asr webapp
relative path traversal
vulnerability
superuser permissions
patch
exploit.

EPSS

0

Percentile

9.9%

Description

NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the “…/” structure when admin privileges are available.

CVSS Score = 2.0
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

Impact

When the optional tool ASR Webapp (https://github.com/NVIDIA/NeMo/tree/main/tools/asr_webapp) is used prior to commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, some interfaces do not verify user input. Malicious attackers can construct malicious requests to delete any directory through the “…/” structure.

The vulnerability affects only cases where this particular web app is started by a user with superuser permissions. The web application is not a part of the regular pip release or the corresponding container, and impacts only users that clone the repository in its entirety and execute the web app (while also possessing superuser permissions).

Patches

This vulnerability has been patched via https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0, which is effectively any clone of the repository post r1.5.1 branch. Since the web app is not distributed via pip release or container, users who clone the main branch post this commit will possess the patch.

Workarounds

The changes in commit https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0 can be applied to any version of the web app without any adverse effect.

Additional Information

Exploit Found on: 2021.12.16
Exploit Found by: @haby0

EPSS

0

Percentile

9.9%

Related for OSV:GHSA-RPX7-33J2-XX9X