AVID-2026-R1633
Description
Directory Traversal in polyaxon/polyaxon (CVE-2024-9362)
Details
An unauthenticated directory traversal vulnerability exists in Polyaxon, affecting the latest version. This vulnerability allows an attacker to retrieve directory information and file contents from the server without proper authorization, leading to sensitive information disclosure. The issue enables access to system directories such as /etc, potentially resulting in significant security risks.
Reason for inclusion in AVID: CVE-2024-9362 describes an unauthenticated directory traversal vulnerability in Polyaxon, a platform used to build, train, deploy, and manage AI/ML workflows. This vulnerability enables unauthorized access to server filesystem data, which can lead to information disclosure within AI pipelines. As Polyaxon is part of the software stack in general-purpose AI systems (dependencies/runtime for ML workflows), this is a software supply-chain vulnerability relevant to GP AI systems. It is clearly AI-related and security-related, with sufficient public evidence (CVE entry and CVSS details).
References
Affected or Relevant Artifacts
- Developer: polyaxon
- Deployer: polyaxon
- Artifact Details:
| Type | Name |
|---|---|
| System | polyaxon/polyaxon |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Base Score | 7.5 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | NONE |
| Availability Impact | NONE |
CWE
| ID | Description |
|---|---|
| CWE-22 | CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-03-20
- Version: 0.3.3
- AVID Entry