CVE-2024-4642 – wandb
Package
Manager: pip
Name: wandb
Vulnerable Version: <0
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Withdrawn Advisory: Weights and Biases (wandb) has a Server-Side Request Forgery (SSRF) vulnerability ## Withdrawn Advisory This advisory has been withdrawn because the underlying issue existed in Weights and Biases's backend server code, not the software development kit included in the `wandb` PyPI package, as originally reported. This link is maintained to preserve external references. ## Original Description A Server-Side Request Forgery (SSRF) vulnerability exists in the wandb/wandb repository due to improper handling of HTTP 302 redirects. This issue allows team members with access to the 'User settings -> Webhooks' function to exploit this vulnerability to access internal HTTP(s) servers. In severe cases, such as on AWS instances, this could potentially be abused to achieve remote code execution on the victim's machine. The vulnerability is present in the latest version of the repository.
Metadata
Created: 2024-05-16T09:33:09Z
Modified: 2024-05-20T20:20:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-cqh9-jfqr-h9jj/GHSA-cqh9-jfqr-h9jj.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-cqh9-jfqr-h9jj
Finding: N/A
Auto approve: 0