You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

coremltools .mlpackage Path Traversal PoC (CWE-22)

Security Research โ€” Responsible Disclosure

This repository contains a proof-of-concept malicious .mlpackage demonstrating a path traversal vulnerability in Apple coremltools' ModelPackage Manifest.json handling.

Files

  • malicious.mlpackage/ โ€” Malicious .mlpackage directory with traversal path in Manifest.json
  • poc.py โ€” Exploitation script

Vulnerability

coremltools does not validate the path field in .mlpackage/Manifest.json. An attacker can use ../ sequences to cause getRootModel().path() to return a path outside the package, which is then opened by load_spec().

Usage

pip install coremltools
python poc.py

Disclaimer

This PoC is for authorized security research and responsible disclosure only. The target file is /etc/hostname (harmless, world-readable).

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support