Skip to content

Commit aad0c02

Browse files
1 parent 55bd441 commit aad0c02

File tree

2 files changed

+15
-5
lines changed

2 files changed

+15
-5
lines changed

advisories/github-reviewed/2025/07/GHSA-7c78-rm87-5673/GHSA-7c78-rm87-5673.json

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7c78-rm87-5673",
4-
"modified": "2025-07-31T14:06:28Z",
4+
"modified": "2025-10-23T17:42:54Z",
55
"published": "2025-07-31T14:04:24Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2025-41419"
8+
],
79
"summary": "MS SWIFT WEB-UI RCE Vulnerability",
8-
"details": "**I. Detailed Description:** \n\n1. Install ms-swift\n ```\n pip install ms-swift -U\n ```\n\n2. Start web-ui\n ```\n swift web-ui --lang en\n ```\n\n3. After startup, access through browser at [http://localhost:7860/](http://localhost:7860/) to see the launched fine-tuning framework program\n\n4. Fill in necessary parameters\n In the LLM Training interface, fill in required parameters including Model id, Dataset Code. The --output_dir can be filled arbitrarily as it will be modified later through packet capture\n\n5. Click Begin to start training. Capture packets and modify the parameter corresponding to --output_dir\n\n You can see the concatenated command being executed in the terminal where web-ui was started\n\n6. Wait for the program to run (testing shows it requires at least 5 minutes), and you can observe the effect of command execution creating files\n\n**II. Vulnerability Proof:**\n```\n/tmp/xxx'; touch /tmp/inject_success_1; #\n```\n\n**III. Fix Solution:**\n1. The swift.ui.llm_train.llm_train.LLMTrain#train() method should not directly concatenate parameters with commands after receiving commands from the frontend\n2. The swift.ui.llm_train.llm_train.LLMTrain#train_local() method should not use os.system for execution, but should be changed to subprocess.run([cmd, arg1, arg2...]) format\n\n## Author\n\n* Discovered by: [TencentAISec](https://github.com/TencentAISec)\n* Contact: *[[email protected]](mailto:[email protected])*",
10+
"details": "**I. Detailed Description:** \n\nThis includes scenarios, screenshots, vulnerability reproduction methods. For account-related vulnerabilities, please provide test accounts. If the reproduction process is complex, you may record a video, upload it to Taopan, and attach the link.\n\n1. Install ms-swift\n ```\n pip install ms-swift -U\n ```\n\n2. Start web-ui\n ```\n swift web-ui --lang en\n ```\n\n3. After startup, access through browser at [http://localhost:7860/](http://localhost:7860/) to see the launched fine-tuning framework program\n\n4. Fill in necessary parameters\n In the LLM Training interface, fill in required parameters including Model id, Dataset Code. The --output_dir can be filled arbitrarily as it will be modified later through packet capture\n\n5. Click Begin to start training. Capture packets and modify the parameter corresponding to --output_dir\n\n You can see the concatenated command being executed in the terminal where web-ui was started\n\n6. Wait for the program to run (testing shows it requires at least 5 minutes), and you can observe the effect of command execution creating files\n\n**II. Vulnerability Proof (Write POC here):**\n```\n/tmp/xxx'; touch /tmp/inject_success_1; #\n```\n\n**III. Fix Solution:**\n1. The swift.ui.llm_train.llm_train.LLMTrain#train() method should not directly concatenate parameters with commands after receiving commands from the frontend\n2. The swift.ui.llm_train.llm_train.LLMTrain#train_local() method should not use os.system for execution, but should be changed to subprocess.run([cmd, arg1, arg2...]) format\n\n## Author\n\n* Discovered by: [TencentAISec](https://github.com/TencentAISec)\n* Contact: *[[email protected]](mailto:[email protected])*",
911
"severity": [
1012
{
1113
"type": "CVSS_V4",
@@ -26,7 +28,7 @@
2628
"introduced": "0"
2729
},
2830
{
29-
"last_affected": "3.6.3"
31+
"fixed": "3.7.0"
3032
}
3133
]
3234
}

advisories/github-reviewed/2025/10/GHSA-f2hf-pfrj-vrm7/GHSA-f2hf-pfrj-vrm7.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f2hf-pfrj-vrm7",
4-
"modified": "2025-10-06T17:58:22Z",
4+
"modified": "2025-10-23T17:43:47Z",
55
"published": "2025-10-06T17:58:22Z",
66
"aliases": [
77
"CVE-2025-49594"
@@ -55,6 +55,14 @@
5555
{
5656
"type": "WEB",
5757
"url": "https://jira.xwiki.org/browse/OIDC-240"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-49594-detect-xwiki-vulnerability"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-49594-mitigate-xwiki-vulnerability"
5866
}
5967
],
6068
"database_specific": {

0 commit comments

Comments
 (0)