- Description
- UltiMaker Cura slicer versions 5.7.0-beta.1 through 5.7.2 are vulnerable to code injection via the 3MF format reader (/plugins/ThreeMFReader.py). The vulnerability arises from improper handling of the drop_to_buildplate property within 3MF files, which are ZIP archives containing the model data. When a 3MF file is loaded in Cura, the value of the drop_to_buildplate property is passed to the Python eval() function without proper sanitization, allowing an attacker to execute arbitrary code by crafting a malicious 3MF file. This vulnerability poses a significant risk as 3MF files are commonly shared via 3D model databases.
- Source
- 596c5446-0ce5-4ba2-aa66-48b3b757a647
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2024-8374
@transilienceai
23 Nov 2024
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-8374
@transilienceai
19 Nov 2024
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-8374
@transilienceai
17 Nov 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨Did you know that 3D models can be exploited for code execution? Our researchers recently uncovered how cybercriminals can abuse vulnerabilities in 3D printing software to perform code execution attacks. Check out our latest post on exploiting CVE-2024-8374 in UltiMaker Cura
@CheckmarxZero
7 Nov 2024
50 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB92243F-31BA-4020-A14D-354230251254"
},
{
"criteria": "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.0:beta1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "28239F08-C811-4286-810D-CA5CCAADA3BE"
},
{
"criteria": "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9150AD1A-1B73-488F-BE15-504E91E69102"
},
{
"criteria": "cpe:2.3:a:ultimaker:ultimaker_cura:5.7.2:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B2BEA10C-907D-4B91-B08F-CEA364CBB9EC"
},
{
"criteria": "cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7AC88948-923C-4604-81BE-815410DA96D5"
},
{
"criteria": "cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1_rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A32F58EA-6F2A-4006-8FCA-F725724CB7B5"
},
{
"criteria": "cpe:2.3:a:ultimaker:ultimaker_cura:5.8.0:beta1_rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C591DCBA-75E4-4967-A588-4DE17BE330BA"
}
],
"operator": "OR"
}
]
}
]