CVE-2024-27763: XPixelGroup BasicSR Command Injection
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3165%
CWE
Published
3/12/2025
Updated
3/13/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| basicsr | pip | <= 1.4.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from line 44 in dist_util.py where subprocess.getoutput(f'scontrol show hostname {node_list} | head -n1') directly interpolates the SLURM_NODELIST environment variable into a shell command. As node_list is user-controlled through environment variables without validation/sanitization, attackers can inject arbitrary commands through command substitution characters. The function _init_dist_slurm handles SLURM cluster initialization and is the only location where this vulnerable command construction occurs, as evidenced by the referenced code snippets and advisory details.