LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.
| Vendor | Product | Versions |
|---|---|---|
| lmdeploy | lmdeploy | < 0.12.3 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| mozilla | firefox | cert_advisory | 90% |
| mozilla | firefox esr | cert_advisory | 90% |
| mozilla | thunderbird | cert_advisory | 90% |
Updated severity to CRITICAL, specified patch version as 0.12.3, and corrected affected versions to < 0.12.2.
Initial creation