** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-45436. Notes: All CVE users should reference CVE-2024-45436 instead of this CVE Record. All references and descriptions in this candidate have been removed to prevent accidental usage.
History

Tue, 15 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via ZipSlip in ollama/ollama ollama: Remote Code Execution via ZipSlip in ollama/ollama
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Apr 2025 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ollama:ollama:0.1.37:*:*:*:*:*:*:*
Vendors & Products Ollama
Ollama ollama
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 15 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in ollama/ollama version 0.1.37 allows for remote code execution (RCE) due to improper input validation in the handling of zip files. The vulnerability, known as ZipSlip, occurs in the parseFromZipFile function in server/model.go. The code does not check for directory traversal sequences (../) in file names within the zip archive, allowing an attacker to write arbitrary files to the file system. This can be exploited to create files such as /etc/ld.so.preload and a malicious shared library, leading to RCE. ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-45436. Notes: All CVE users should reference CVE-2024-45436 instead of this CVE Record. All references and descriptions in this candidate have been removed to prevent accidental usage.

Wed, 26 Mar 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Ollama
Ollama ollama
CPEs cpe:2.3:a:ollama:ollama:0.1.37:*:*:*:*:*:*:*
Vendors & Products Ollama
Ollama ollama
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 21 Mar 2025 14:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Critical


Thu, 20 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in ollama/ollama version 0.1.37 allows for remote code execution (RCE) due to improper input validation in the handling of zip files. The vulnerability, known as ZipSlip, occurs in the parseFromZipFile function in server/model.go. The code does not check for directory traversal sequences (../) in file names within the zip archive, allowing an attacker to write arbitrary files to the file system. This can be exploited to create files such as /etc/ld.so.preload and a malicious shared library, leading to RCE.
Title Remote Code Execution via ZipSlip in ollama/ollama
Weaknesses CWE-20
References
Metrics cvssV3_0

{'score': 9.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: REJECTED

Assigner: @huntr_ai

Published:

Updated: 2025-04-15T15:49:34.681Z

Reserved: 2024-08-13T20:28:18.382Z

Link: CVE-2024-7773

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2025-03-20T10:15:37.393

Modified: 2025-04-15T16:15:24.090

Link: CVE-2024-7773

cve-icon Redhat

Severity : Critical

Publid Date: 2025-03-20T10:09:13Z

Links: CVE-2024-7773 - Bugzilla