Loading HuntDB...

GHSA-wxcx-gg9c-fwp2

GitHub Security Advisory

TorchServe vulnerable to bypass of allowed_urls configuration

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact
TorchServe's check on allowed_urls configuration can be by-passed if the URL contains characters such as ".." but it does not prevent the model from being downloaded into the model store. Once a file is downloaded, it can be referenced without providing a URL the second time, which effectively bypasses the allowed_urls security check. Customers using PyTorch inference Deep Learning Containers (DLC) through Amazon SageMaker and EKS are not affected.

### Patches
This issue in TorchServe has been fixed by validating the URL without characters such as ".." before downloading: [#3082](https://github.com/pytorch/serve/pull/3082).

TorchServe release 0.11.0 includes the fix to address this vulnerability.

### References
* [#3082](https://github.com/pytorch/serve/pull/3082)
* [TorchServe release v0.11.0](https://github.com/pytorch/serve/releases/tag/v0.11.0)

Thank Kroll Cyber Risk for for responsibly disclosing this issue.

If you have any questions or comments about this advisory, we ask that you contact AWS Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.

Affected Packages

PyPI torchserve
Affected versions: 0 (fixed in 0.11.0)

Related CVEs

Key Information

GHSA ID
GHSA-wxcx-gg9c-fwp2
Published
July 18, 2024 10:03 PM
Last Modified
August 7, 2024 4:01 PM
CVSS Score
9.0 /10
Primary Ecosystem
PyPI
Primary Package
torchserve
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 1, 2025 6:44 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.