You need to agree to share your contact information to access this dataset

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this dataset content.

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

PoC: CWE-94 eval() RCE in ultralytics/ultralytics

Vulnerability: ultralytics/nn/tasks.py:1567Conv.default_act = eval(act) on the activation field from a YAML model config.

Affected repo: ultralytics/ultralytics @ 6eddf359

Usage

from ultralytics.nn.tasks import parse_model
from ultralytics.utils import YAML

d = YAML.load("malicious_model.yaml")  # SafeLoader — YAML parsing is safe
parse_model(d, ch=3, verbose=False)    # eval(act) triggers HERE at tasks.py:1567

Or via the standard API:

from ultralytics import YOLO
model = YOLO("malicious_model.yaml")  # RCE on model load

This file is a PoC for a security research submission to huntr.com.

Downloads last month
16