TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives
References
Link | Resource |
---|---|
https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall | Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/README.md | Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/utils/data_utils.py#L137 | Third Party Advisory |
https://keras.io/api/ | Third Party Advisory |
https://vuln.ryotak.me/advisories/52 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-06-30T00:12:53
Updated: 2021-06-30T00:12:53
Reserved: 2021-06-30T00:00:00
Link: CVE-2021-35958
JSON object: View
NVD Information
Status : Modified
Published: 2021-06-30T01:15:07.033
Modified: 2024-05-17T01:58:44.037
Link: CVE-2021-35958
JSON object: View
Redhat Information
No data.
CWE