Home » Database

AVID-2026-R1485

Description

TorchServe bypass allowed_urls configuration (CVE-2024-35198)

Details

TorchServe is a flexible and easy-to-use tool for serving and scaling PyTorch models in production. TorchServe ’s check on allowed_urls configuration can be by-passed if the URL contains characters such as “..” but it does not prevent the model from being downloaded into the model store. Once a file is downloaded, it can be referenced without providing a URL the second time, which effectively bypasses the allowed_urls security check. Customers using PyTorch inference Deep Learning Containers (DLC) through Amazon SageMaker and EKS are not affected. This issue in TorchServe has been fixed by validating the URL without characters such as “..” before downloading see PR #3082. TorchServe release 0.11.0 includes the fix to address this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Reason for inclusion in AVID: CVE-2024-35198 concerns TorchServe, a model-serving component used in AI deployments. It describes a bypass of allowed_urls when downloading model artifacts, enabling potential security breaches in AI inference pipelines. This directly impacts AI systems' deployment/serving stack and their supply chain (model-serving libraries and artifacts). The CVE is high-severity (CVSS 9.8) and includes a fix in TorchServe 0.11.0, with clear remediation. It is a software vulnerability (not hardware/firmware-only) and pertains to software commonly used in ML pipelines.

References

Affected or Relevant Artifacts

  • Developer: pytorch
  • Deployer: pytorch
  • Artifact Details:
TypeName
Systemserve

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-706CWE-706: Use of Incorrectly-Resolved Name or Reference

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-07-18
  • Version: 0.3.3
  • AVID Entry