
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-45907 is a security vulnerability discovered in PyTorch affecting versions before trunk/89695. The vulnerability was disclosed on November 26, 2022, and involves the torch.jit.annotations.parse_type_line function which could allow arbitrary code execution due to unsafe use of the eval function (NVD, CVE).
The vulnerability exists in the torch.jit.annotations.parse_type_line function where eval is used unsafely to process type annotations. This implementation could allow arbitrary Python code execution through specially crafted type annotations. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD).
The vulnerability allows attackers to execute arbitrary code on affected systems through the unsafe evaluation of type annotations. This could lead to complete system compromise, as demonstrated by the ability to execute system commands through crafted type annotations (GitHub Issue).
The vulnerability was fixed in PyTorch trunk/89695 by introducing an _eval_no_call method that evaluates statements only if they do not contain any calls, which is determined by examining the bytecode. Users should upgrade to PyTorch version 1.13.1 or later which includes this security fix (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."