7.8
CVE-2024-8374
- EPSS 0.13%
- Veröffentlicht 03.09.2024 10:15:06
- Zuletzt bearbeitet 16.09.2024 16:44:42
- Quelle 596c5446-0ce5-4ba2-aa66-48b3b7
- CVE-Watchlists
- Unerledigt
UltiMaker Cura slicer versions 5.7.0-beta.1 through 5.7.2 are vulnerable to code injection via the 3MF format reader (/plugins/ThreeMFReader.py). The vulnerability arises from improper handling of the drop_to_buildplate property within 3MF files, which are ZIP archives containing the model data. When a 3MF file is loaded in Cura, the value of the drop_to_buildplate property is passed to the Python eval() function without proper sanitization, allowing an attacker to execute arbitrary code by crafting a malicious 3MF file. This vulnerability poses a significant risk as 3MF files are commonly shared via 3D model databases.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ultimaker ≫ Ultimaker Cura Version5.7.0 Update-
Ultimaker ≫ Ultimaker Cura Version5.7.0 Updatebeta1
Ultimaker ≫ Ultimaker Cura Version5.7.1
Ultimaker ≫ Ultimaker Cura Version5.7.2 Updaterc2
Ultimaker ≫ Ultimaker Cura Version5.8.0 Updatebeta1
Ultimaker ≫ Ultimaker Cura Version5.8.0 Updatebeta1_rc1
Ultimaker ≫ Ultimaker Cura Version5.8.0 Updatebeta1_rc2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.331 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| 596c5446-0ce5-4ba2-aa66-48b3b757a647 | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.