Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45803
HistoryMar 08, 2024 - 6:44 a.m.

Command Injection

2024-03-0806:44:16
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
3
paddlepaddle
command injection
vulnerability
input validation
subprocess call

9.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

paddlepaddle is vulnerable to Command Injection. The vulnerability is caused due to the lack of proper input validation in the user-supplied data (save_path and name parameters), which are directly incorporated into the subprocess call. This can lead to command injection.

CPENameOperatorVersion
paddlepaddlele2.6.0
paddlepaddlele2.6.0

9.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for VERACODE:45803