TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives
References
Configurations
History
21 Nov 2024, 06:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall - Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/README.md - Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/utils/data_utils.py#L137 - Third Party Advisory | |
References | () https://keras.io/api/ - Third Party Advisory | |
References | () https://vuln.ryotak.me/advisories/52 - Third Party Advisory |
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
Summary | TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives |
Information
Published : 2021-06-30 01:15
Updated : 2024-11-21 06:12
NVD link : CVE-2021-35958
Mitre link : CVE-2021-35958
CVE.ORG link : CVE-2021-35958
JSON object : View
Products Affected
- tensorflow
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')