CVE-2023-52314: PaddlePaddle command injection in convert_shape_compare
(updated )
PaddlePaddle before 2.6.0 has a command injection in convert_shape_compare. This resulted in the ability to execute arbitrary commands on the operating system.
References
- github.com/PaddlePaddle/Paddle
- github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md
- github.com/PaddlePaddle/Paddle/commit/5ed9478fdef96a06eeec9093f9e768c97b094af3
- github.com/advisories/GHSA-3cr5-2446-8pg3
- github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2024-146.yaml
- nvd.nist.gov/vuln/detail/CVE-2023-52314
Detect and mitigate CVE-2023-52314 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →