** DISPUTED ** TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives.
References
Link | Resource |
---|---|
https://keras.io/api/ | Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/utils/data_utils.py#L137 | Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/README.md | Third Party Advisory |
https://vuln.ryotak.me/advisories/52 | Third Party Advisory |
https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall | Third Party Advisory |
Configurations
Information
Published : 2021-06-29 18:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-35958
Mitre link : CVE-2021-35958
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
- tensorflow