CVE-2023-52311: PaddlePaddle command injection in _wget_download
9.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.48894%
CWE
Published
1/3/2024
Updated
11/22/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| PaddlePaddle | pip | < 2.6.0 | 2.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly references _wget_download as the entry point. The commit diff shows the vulnerable version directly interpolates the 'url' parameter into a shell command without proper validation (CWE-78). The patch adds URL scheme validation using urlparse and error handling, confirming the original implementation's insecurity. The function's use of subprocess.Popen with shell=True and untrusted input creates an unambiguous command injection vector.