Impact
This vulnerability affects CVAT deployments that run any of the serverless functions of type tracker
from the CVAT Git repository, namely TransT and SiamMask. Deployments with custom functions of type tracker
may also be affected, depending on how they handle state serialization. If a function uses an unsafe serialization library such as pickle
or jsonpickle
, it's likely to be vulnerable.
An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container.
Patches
Upgrade to CVAT 2.26.0 or later.
It is not necessary to change or redeploy the Nuclio functions once you have updated CVAT to a fixed version.
Workarounds
If you are unable to upgrade, shut down any instances of the TransT or SiamMask functions you're running:
nuctl delete function pth-dschoerk-transt
nuctl delete function pth-foolwood-siammask
If you're running any custom tracker functions, ensure that the code in those functions that is responsible for restoring tracking state is secure against malicious inputs.
References
Fix commit: 563e1df
Impact
This vulnerability affects CVAT deployments that run any of the serverless functions of type
tracker
from the CVAT Git repository, namely TransT and SiamMask. Deployments with custom functions of typetracker
may also be affected, depending on how they handle state serialization. If a function uses an unsafe serialization library such aspickle
orjsonpickle
, it's likely to be vulnerable.An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container.
Patches
Upgrade to CVAT 2.26.0 or later.
It is not necessary to change or redeploy the Nuclio functions once you have updated CVAT to a fixed version.
Workarounds
If you are unable to upgrade, shut down any instances of the TransT or SiamMask functions you're running:
If you're running any custom tracker functions, ensure that the code in those functions that is responsible for restoring tracking state is secure against malicious inputs.
References
Fix commit: 563e1df