| ID |
CVE-2025-8406
|
| Sažetak |
ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard links. This vulnerability can lead to arbitrary file writes, potentially resulting in arbitrary command execution if critical files are overwritten. |
| Reference |
|
| CVSS |
| Base: | 6.3 |
| Impact: | 5.9 |
| Exploitability: | 0.3 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
HIGH |
HIGH |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| HIGH |
HIGH |
HIGH |
|
| CVSS vektor |
CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H |
| Zadnje važnije ažuriranje |
30-10-2025 - 14:08 |
| Objavljeno |
05-10-2025 - 09:15 |