CVE-2024-10372

A vulnerability classified as problematic was found in chidiwilliams buzz 1.1.0. This vulnerability affects the function download_model of the file buzz/model_loader.py. The manipulation leads to insecure temporary file. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.281764 Permissions Required VDB Entry
https://vuldb.com/?id.281764 Third Party Advisory VDB Entry
https://vuldb.com/?submit.425441 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:chidiwilliams:buzz:1.1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-10-25 02:15

Updated : 2024-11-06 16:14


NVD link : CVE-2024-10372

Mitre link : CVE-2024-10372

CVE.ORG link : CVE-2024-10372


JSON object : View

Products Affected

chidiwilliams

  • buzz
CWE
CWE-377

Insecure Temporary File