TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives
References
Configurations
History
No history.
Information
Published : 2021-06-30 01:15
Updated : 2024-11-21 06:12
NVD link : CVE-2021-35958
Mitre link : CVE-2021-35958
CVE.ORG link : CVE-2021-35958
JSON object : View
Products Affected
- tensorflow
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')