GHSA-CQH9-JFQR-H9JJ
Vulnerability from github – Published: 2024-05-16 09:33 – Updated: 2024-05-20 20:20Withdrawn Advisory
This advisory has been withdrawn because the underlying issue existed in Weights and Biases's backend server code, not the software development kit included in the wandb PyPI package, as originally reported. This link is maintained to preserve external references.
Original Description
A Server-Side Request Forgery (SSRF) vulnerability exists in the wandb/wandb repository due to improper handling of HTTP 302 redirects. This issue allows team members with access to the 'User settings -> Webhooks' function to exploit this vulnerability to access internal HTTP(s) servers. In severe cases, such as on AWS instances, this could potentially be abused to achieve remote code execution on the victim's machine. The vulnerability is present in the latest version of the repository.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "wandb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.17.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-4642"
],
"database_specific": {
"cwe_ids": [
"CWE-918"
],
"github_reviewed": true,
"github_reviewed_at": "2024-05-16T17:46:18Z",
"nvd_published_at": "2024-05-16T09:15:17Z",
"severity": "HIGH"
},
"details": "## Withdrawn Advisory\nThis advisory has been withdrawn because the underlying issue existed in Weights and Biases\u0027s backend server code, not the software development kit included in the `wandb` PyPI package, as originally reported. This link is maintained to preserve external references.\n\n## Original Description\nA Server-Side Request Forgery (SSRF) vulnerability exists in the wandb/wandb repository due to improper handling of HTTP 302 redirects. This issue allows team members with access to the \u0027User settings -\u003e Webhooks\u0027 function to exploit this vulnerability to access internal HTTP(s) servers. In severe cases, such as on AWS instances, this could potentially be abused to achieve remote code execution on the victim\u0027s machine. The vulnerability is present in the latest version of the repository.",
"id": "GHSA-cqh9-jfqr-h9jj",
"modified": "2024-05-20T20:20:22Z",
"published": "2024-05-16T09:33:09Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4642"
},
{
"type": "PACKAGE",
"url": "https://github.com/wandb/wandb"
},
{
"type": "WEB",
"url": "https://github.com/wandb/wandb/blob/main/wandb/sdk/lib/import_hooks.py#L1"
},
{
"type": "WEB",
"url": "https://huntr.com/bounties/055eb540-57f8-46d6-b858-3a9e22d347d9"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Withdrawn Advisory: Weights and Biases (wandb) has a Server-Side Request Forgery (SSRF) vulnerability",
"withdrawn": "2024-05-20T20:20:22Z"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.