Skip to content

Arbitrary file deletion in NeMo ASR webapp

Low
titu1994 published GHSA-rpx7-33j2-xx9x Jan 6, 2022

Package

pip nemo_toolkit (pip)

Affected versions

<=1.5.1

Patched versions

1.6.0, main

Description

Description

NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the "../" structure when admin privileges are available.

CVSS Score = 2.0
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

Impact

When the optional tool ASR Webapp (https://github.com/NVIDIA/NeMo/tree/main/tools/asr_webapp) is used prior to commit f7e4ed7, some interfaces do not verify user input. Malicious attackers can construct malicious requests to delete any directory through the "../" structure.

The vulnerability affects only cases where this particular web app is started by a user with superuser permissions. The web application is not a part of the regular pip release or the corresponding container, and impacts only users that clone the repository in its entirety and execute the web app (while also possessing superuser permissions).

Patches

This vulnerability has been patched via f7e4ed7, which is effectively any clone of the repository post r1.5.1 branch. Since the web app is not distributed via pip release or container, users who clone the main branch post this commit will possess the patch.

Workarounds

The changes in commit f7e4ed7 can be applied to any version of the web app without any adverse effect.

Additional Information

Exploit Found on: 2021.12.16
Exploit Found by: @haby0

Severity

Low

CVE ID

CVE-2022-22821

Weaknesses

Credits