CVE-2023-48299: TorchServe ZipSlip
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.68158%
CWE
Published
11/21/2023
Updated
11/21/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| torchserve | pip | >= 0.1.0, < 0.9.0 | 0.9.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing path validation in archive extraction functions. The commit diff shows both unzip() and decompressTarGzipFile() were patched with canonical path checks to prevent ZipSlip. The pre-patch code: 1) Used zip/tar entry names directly to create File objects 2) Lacked the canonical path comparison that ensures extracted files remain within the target directory 3) Matches the CWE-22 pattern of improper path limitation. The functions' direct handling of archive entries without validation makes them clearly vulnerable.