10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
50.5%
torchserve is vulnerable to Server Side Request Forgery (SSRF). The vulnerability is caused by a missing input validation check in the default configuration for the property value of allowed_urls
, which is used to restrict URLs used to load the PyTorch model in the application. This can lead to an attacker loading the model of their choice from any URL they wish to use resulting in a remote HTTP download requests.
CPE | Name | Operator | Version |
---|---|---|---|
torchserve | le | 0.8.1 | |
torchserve | le | 0.8.1 |
packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html
github.com/pytorch/serve/blob/b3eced56b4d9d5d3b8597aa506a0bcf954d291bc/docs/configuration.md?plain=1#L296
github.com/pytorch/serve/commit/921f42392a8ec4b9c8756e8be7d8527b342a1bab
github.com/pytorch/serve/pull/2534
github.com/pytorch/serve/releases/tag/v0.8.2
github.com/pytorch/serve/security/advisories/GHSA-8fxr-qfr9-p34w