A vulnerability in ollama/ollama version 0.1.37 allows for remote code execution (RCE) due to improper input validation in the handling of zip files. The vulnerability, known as ZipSlip, occurs in the parseFromZipFile function in server/model.go. The code does not check for directory traversal sequences (../) in file names within the zip archive, allowing an attacker to write arbitrary files to the file system. This can be exploited to create files such as /etc/ld.so.preload and a malicious shared library, leading to RCE.
History

Wed, 26 Mar 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Ollama
Ollama ollama
CPEs cpe:2.3:a:ollama:ollama:0.1.37:*:*:*:*:*:*:*
Vendors & Products Ollama
Ollama ollama
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 21 Mar 2025 14:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Critical


Thu, 20 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in ollama/ollama version 0.1.37 allows for remote code execution (RCE) due to improper input validation in the handling of zip files. The vulnerability, known as ZipSlip, occurs in the parseFromZipFile function in server/model.go. The code does not check for directory traversal sequences (../) in file names within the zip archive, allowing an attacker to write arbitrary files to the file system. This can be exploited to create files such as /etc/ld.so.preload and a malicious shared library, leading to RCE.
Title Remote Code Execution via ZipSlip in ollama/ollama
Weaknesses CWE-20
References
Metrics cvssV3_0

{'score': 9.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:09:13.433Z

Updated: 2025-03-20T13:52:25.401Z

Reserved: 2024-08-13T20:28:18.382Z

Link: CVE-2024-7773

cve-icon Vulnrichment

Updated: 2025-03-20T13:50:27.206Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T10:15:37.393

Modified: 2025-03-26T17:27:56.490

Link: CVE-2024-7773

cve-icon Redhat

Severity : Critical

Publid Date: 2025-03-20T10:09:13Z

Links: CVE-2024-7773 - Bugzilla