Impact
TorchGeo 0.4–0.6.0 used an eval statement in its model weight API that could allow an unauthenticated, remote attacker to execute arbitrary commands. All platforms that expose torchgeo.models.get_weight() or torchgeo.trainers as an external API could be affected.
Patches
The eval statement was replaced with a fixed enum lookup, preventing arbitrary code injection. All users are encouraged to upgrade to TorchGeo 0.6.1 or newer.
Workarounds
In unpatched versions, input validation and sanitization can be used to avoid this vulnerability.
References
Bug history
References
Impact
TorchGeo 0.4–0.6.0 used an
evalstatement in its model weight API that could allow an unauthenticated, remote attacker to execute arbitrary commands. All platforms that exposetorchgeo.models.get_weight()ortorchgeo.trainersas an external API could be affected.Patches
The
evalstatement was replaced with a fixed enum lookup, preventing arbitrary code injection. All users are encouraged to upgrade to TorchGeo 0.6.1 or newer.Workarounds
In unpatched versions, input validation and sanitization can be used to avoid this vulnerability.
References
Bug history
References