Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-37032 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Ollama < 0.1.34 fails to validate **SHA256 digest format** when fetching model paths.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **Improper Input Validation** (CWE-20). The system does not strictly enforce the **64-hex-digit SHA256 format**.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users running **Ollama versions prior to 0.1.34**. Specifically, local deployments of the Ollama open-source LLM runner. 🐳 Docker users on older images are also at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With a **rogue registry server**, hackers can achieve **RCE**. They can execute arbitrary commands (e.g., reverse shells via `bash -i`) and write malicious files to the server's filesystem.…

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: **Medium**. Requires the victim to pull a model from a **rogue/malicious registry server**.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploits**: **YES**. Multiple PoCs exist on GitHub (e.g., `Bi0x/CVE-2024-37032`, `pankass`). Automated scanners like **Nuclei** templates are also available.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check your Ollama version (`ollama --version`). 2. Use scanners like `ahboon/CVE-2024-37032-scanner` to test subnets. 3. Look for Nuclei CVE templates. πŸ› οΈ If version < 0.1.34, you are vulnerable.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **YES**. Officially patched in **Ollama v0.1.34**. The fix ensures strict validation of the digest format (exactly 64 hex digits) and prevents path traversal sequences. πŸ›‘οΈ

Q9What if no patch? (Workaround)

🚧 **Workaround**: If you cannot patch immediately: 1. **Isolate** Ollama from untrusted networks. 2. **Do not** pull models from unverified/rogue registries. 3. Restrict filesystem permissions for the Ollama user. 🚫

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. Since PoCs are public and RCE is possible, immediate upgrade to **v0.1.34+** is recommended. Do not ignore this if you expose Ollama to any external or untrusted model sources. πŸƒβ€β™‚οΈπŸ’¨