AVID-2026-R1605
Description
Arbitrary File Overwrite in onnx/onnx (CVE-2024-7776)
Details
A vulnerability in the download_model function of the onnx/onnx framework, before and including version 1.16.1, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability can be exploited by an attacker to overwrite files in the user’s directory, potentially leading to remote command execution.
Reason for inclusion in AVID: CVE-2024-7776 describes an arbitrary file overwrite (path traversal) vulnerability in the onnx/onnx library, exploitable via download_model. ONNX is a core ML framework widely used in AI model development, deployment, and serving. The issue is in a software dependency commonly used to build/run general-purpose AI systems, representing a software supply chain vulnerability with potential remote command execution. This aligns with AI-related, GPAI supply chain, and security/safety vulnerability criteria, and the report provides explicit evidence (CVE entry, CVSS metrics).
References
Affected or Relevant Artifacts
- Developer: onnx
- Deployer: onnx
- Artifact Details:
| Type | Name |
|---|---|
| System | onnx/onnx |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H |
| Base Score | 8.1 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-22 | CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-03-20
- Version: 0.3.3
- AVID Entry