CVE-2024-37032
Ollama Remote Code Execution
Severity Score
"-"
*CVSS v-
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Ollama anterior a 0.1.34 no valida el formato del resumen (sha256 con 64 dígitos hexadecimales) al obtener la ruta del modelo y, por lo tanto, maneja mal los casos de prueba TestGetBlobsPath, como menos de 64 dígitos hexadecimales, más de 64 dígitos hexadecimales o una inicial. ../ subcadena.
Ollama versions prior to 0.1.34 suffer from a remote code execution vulnerability.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-05-31 CVE Reserved
- 2024-05-31 CVE Published
- 2024-06-26 First Exploit
- 2024-07-16 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (7)
URL | Date | SRC |
---|---|---|
https://github.com/Bi0x/CVE-2024-37032?tab=readme-ov-file | 2024-06-26 | |
https://github.com/Bi0x/CVE-2024-37032 | 2024-06-28 | |
https://github.com/ahboon/CVE-2024-37032-scanner | 2024-07-10 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
- | - | - | - | - |