Vulnerability Description
In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paddlepaddle | Paddlepaddle | < 2.4 |
Related Weaknesses (CWE)
References
- https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-ExploitPatchThird Party Advisory
- https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48PatchThird Party Advisory
- https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-ExploitPatchThird Party Advisory
- https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48PatchThird Party Advisory
FAQ
What is CVE-2022-45908?
CVE-2022-45908 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
How severe is CVE-2022-45908?
CVE-2022-45908 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-45908?
Check the references section above for vendor advisories and patch information. Affected products include: Paddlepaddle Paddlepaddle.