Flax/Orbax Path Traversal PoC (CWE-22)
Security Research - Proof of Concept
This repository contains a malicious Flax checkpoint that demonstrates a path traversal vulnerability in orbax-checkpoint. The _METADATA file contains absolute paths as parameter key names, which causes os.path.join() in tensorstore_utils.py to read zarr-format data from arbitrary filesystem locations.
Files
_METADATAโ Malicious checkpoint metadata (the attack payload)poc.pyโ Full PoC script that creates victim data, builds the malicious checkpoint, and demonstrates the path traversal
Usage
pip install flax orbax-checkpoint tensorstore numpy
python poc.py
Disclaimer
This PoC is for authorized security research only. The payload reads harmless test data created by the script itself.
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support