We use cookies to improve your experience on our site.
AVID-2026-R1359
Description
Vulnerability CVE-2024-0815
Details
Command injection in paddle.utils.download._wget_download (bypass filter) in paddlepaddle/paddle 2.6.0
Reason for inclusion in AVID: CVE-2024-0815 is a command injection vulnerability in PaddlePaddle’s download utility, affecting the PaddlePaddle software framework. PaddlePaddle is a general-purpose AI framework; the flaw resides in its software supply chain (a dependency used to build/train/deploy AI systems). It’s a security vulnerability with high impact, meeting AVID criteria for AI-related, GP AI supply-chain, and evidence-based assessment.
References
Affected or Relevant Artifacts
- Developer: paddlepaddle
- Deployer: paddlepaddle
- Artifact Details:
| Type | Name |
|---|---|
| System | paddlepaddle/paddle |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Base Score | 9.3 |
| Base Severity | 🔴 Critical |
| Attack Vector | LOCAL |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | CHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-78 | CWE-78 Improper Neutralization of Special Elements used in an OS Command |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-03-07
- Version: 0.3.3
- AVID Entry