PoC: ONNX Runtime NV TensorRT RTX Path Traversal
This repository contains a proof-of-concept for a security vulnerability. It is intended for responsible disclosure via huntr.com.
Vulnerability
Inverted boolean logic in onnx_ctx_model_helper.cc (line 321) of the NV TensorRT RTX execution provider disables path traversal security checks when loading EP context models from file paths.
Vulnerable code:
bool make_secure_path_checks = ep_context_model_path_.empty();
// Should be: !ep_context_model_path_.empty();
Files
malicious_ep_context_model.onnxโ Crafted ONNX model with path traversal payload inonnx_model_filenameattributepoc_onnxruntime_tensorrt_rtx.pyโ Script that generates the PoC model and explains the vulnerability
Impact
Arbitrary file read when loading attacker-supplied ONNX models with the NvTensorRTRTX execution provider.
Researcher
Ryan โ Fan Pier Labs (ryan@fanpierlabs.com)
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support