CVE-2021-35958

TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:36

Type Values Removed Values Added
Summary ** DISPUTED ** TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives. TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives

Information

Published : 2021-06-30 01:15

Updated : 2024-08-04 01:15


NVD link : CVE-2021-35958

Mitre link : CVE-2021-35958

CVE.ORG link : CVE-2021-35958


JSON object : View

Products Affected

google

  • tensorflow
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')