You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

OpenVINO ONNX Path Traversal PoC (CWE-22)

Security Research โ€” Responsible Disclosure

This repository contains a proof-of-concept malicious ONNX model demonstrating a path traversal vulnerability in OpenVINO's ONNX frontend (sanitize_path() bypass).

Files

  • malicious_model/malicious_model.onnx โ€” ONNX model with external_data location containing ../ traversal
  • malicious_model/data/ โ€” Required subdirectory for weakly_canonical() resolution
  • poc.py โ€” Exploitation script

Vulnerability

OpenVINO's sanitize_path() in file_util.cpp only strips LEADING characters from {/, ., \}. A path like data/../../../etc/hostname starts with d (not in strip set), passes unchanged, and weakly_canonical() resolves the traversal.

Usage

pip install openvino onnx numpy
python poc.py

Disclaimer

This PoC is for authorized security research and responsible disclosure only. The target file is /etc/hostname (harmless, world-readable).

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support