Bert-VITS2 is the VITS2 Backbone with multilingual bert. User input supplied to the data_dir variable is concatenated with other folders and used to open a new file in the generate_config function, which leads to a limited file write. The issue allows for writing /config/config.json file in arbitrary directory on the server. If a given directory path doesn’t exist, the application will return an error, so this vulnerability could also be used to gain information about existing directories on the server. This affects fishaudio/Bert-VITS2 2.3 and earlier.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fish.audio
Fish.audio bert-vits2 |
|
CPEs | cpe:2.3:a:fish.audio:bert-vits2:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fish.audio
Fish.audio bert-vits2 |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-22T15:21:18.371Z
Updated: 2024-08-02T04:26:16.013Z
Reserved: 2024-06-27T18:44:13.035Z
Link: CVE-2024-39688
Vulnrichment
Updated: 2024-07-22T18:41:53.284Z
NVD
Status : Modified
Published: 2024-07-22T16:15:03.883
Modified: 2024-11-21T09:28:13.527
Link: CVE-2024-39688
Redhat
No data.