CVE-2024-2914

A TarSlip vulnerability exists in the deepjavalibrary/djl, affecting version 0.26.0 and fixed in version 0.27.0. This vulnerability allows an attacker to manipulate file paths within tar archives to overwrite arbitrary files on the target system. Exploitation of this vulnerability could lead to remote code execution, privilege escalation, data theft or manipulation, and denial of service. The vulnerability is due to improper validation of file paths during the extraction of tar files, as demonstrated in multiple occurrences within the library's codebase, including but not limited to the files_util.py and extract_imagenet.py scripts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:djl:deep_java_library:0.26.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://github.com/deepjavalibrary/djl/commit/5235be508cec9e8cb6f496a4ed2fa40e4f62c370 - Patch () https://github.com/deepjavalibrary/djl/commit/5235be508cec9e8cb6f496a4ed2fa40e4f62c370 - Patch
References () https://huntr.com/bounties/b064bd2f-bf6e-4fc0-898e-7d02a9b97e24 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://huntr.com/bounties/b064bd2f-bf6e-4fc0-898e-7d02a9b97e24 - Exploit, Issue Tracking, Patch, Third Party Advisory

26 Sep 2024, 14:12

Type Values Removed Values Added
CWE CWE-22
CPE cpe:2.3:a:djl:deep_java_library:0.26.0:*:*:*:*:*:*:*
First Time Djl
Djl deep Java Library
References () https://github.com/deepjavalibrary/djl/commit/5235be508cec9e8cb6f496a4ed2fa40e4f62c370 - () https://github.com/deepjavalibrary/djl/commit/5235be508cec9e8cb6f496a4ed2fa40e4f62c370 - Patch
References () https://huntr.com/bounties/b064bd2f-bf6e-4fc0-898e-7d02a9b97e24 - () https://huntr.com/bounties/b064bd2f-bf6e-4fc0-898e-7d02a9b97e24 - Exploit, Issue Tracking, Patch, Third Party Advisory
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 8.8

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad Tarslip en deepjavalibrary/djl, que afecta a la versión 0.26.0 y se corrigió en la versión 0.27.0. Esta vulnerabilidad permite a un atacante manipular rutas de archivos dentro de archivos tar para sobrescribir archivos arbitrarios en el sistema de destino. La explotación de esta vulnerabilidad podría conducir a la ejecución remota de código, escalada de privilegios, robo o manipulación de datos y denegación de servicio. La vulnerabilidad se debe a una validación inadecuada de las rutas de los archivos durante la extracción de archivos tar, como se demuestra en múltiples apariciones dentro del código base de la librería, incluidos, entre otros, los scripts files_util.py y extract_imagenet.py.

06 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 18:15

Updated : 2024-11-21 09:10


NVD link : CVE-2024-2914

Mitre link : CVE-2024-2914

CVE.ORG link : CVE-2024-2914


JSON object : View

Products Affected

djl

  • deep_java_library
CWE
CWE-29

Path Traversal: '\..\filename'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')