Home » Database

AVID-2026-R1605

Description

Arbitrary File Overwrite in onnx/onnx (CVE-2024-7776)

Details

A vulnerability in the download_model function of the onnx/onnx framework, before and including version 1.16.1, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability can be exploited by an attacker to overwrite files in the user’s directory, potentially leading to remote command execution.

Reason for inclusion in AVID: CVE-2024-7776 describes an arbitrary file overwrite (path traversal) vulnerability in the onnx/onnx library, exploitable via download_model. ONNX is a core ML framework widely used in AI model development, deployment, and serving. The issue is in a software dependency commonly used to build/run general-purpose AI systems, representing a software supply chain vulnerability with potential remote command execution. This aligns with AI-related, GPAI supply chain, and security/safety vulnerability criteria, and the report provides explicit evidence (CVE entry, CVSS metrics).

References

Affected or Relevant Artifacts

  • Developer: onnx
  • Deployer: onnx
  • Artifact Details:
TypeName
Systemonnx/onnx

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Base Score8.1
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionREQUIRED
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry