Metrics
Affected Vendors & Products
Tue, 15 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Remote Code Execution via ZipSlip in ollama/ollama | ollama: Remote Code Execution via ZipSlip in ollama/ollama |
Metrics |
ssvc
|
Tue, 15 Apr 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Ollama
Ollama ollama |
|
Metrics |
cvssV3_1
|
Tue, 15 Apr 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in ollama/ollama version 0.1.37 allows for remote code execution (RCE) due to improper input validation in the handling of zip files. The vulnerability, known as ZipSlip, occurs in the parseFromZipFile function in server/model.go. The code does not check for directory traversal sequences (../) in file names within the zip archive, allowing an attacker to write arbitrary files to the file system. This can be exploited to create files such as /etc/ld.so.preload and a malicious shared library, leading to RCE. | ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-45436. Notes: All CVE users should reference CVE-2024-45436 instead of this CVE Record. All references and descriptions in this candidate have been removed to prevent accidental usage. |
Wed, 26 Mar 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ollama
Ollama ollama |
|
CPEs | cpe:2.3:a:ollama:ollama:0.1.37:*:*:*:*:*:*:* | |
Vendors & Products |
Ollama
Ollama ollama |
|
Metrics |
cvssV3_1
|
Fri, 21 Mar 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 20 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in ollama/ollama version 0.1.37 allows for remote code execution (RCE) due to improper input validation in the handling of zip files. The vulnerability, known as ZipSlip, occurs in the parseFromZipFile function in server/model.go. The code does not check for directory traversal sequences (../) in file names within the zip archive, allowing an attacker to write arbitrary files to the file system. This can be exploited to create files such as /etc/ld.so.preload and a malicious shared library, leading to RCE. | |
Title | Remote Code Execution via ZipSlip in ollama/ollama | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_0
|

Status: REJECTED
Assigner: @huntr_ai
Published:
Updated: 2025-04-15T15:49:34.681Z
Reserved: 2024-08-13T20:28:18.382Z
Link: CVE-2024-7773

Updated:

Status : Rejected
Published: 2025-03-20T10:15:37.393
Modified: 2025-04-15T16:15:24.090
Link: CVE-2024-7773
