Arbitrary File Overwrite Vulnerability in TensorFlow Keras Utility
CVE-2021-35958

9.1CRITICAL

Key Information:

Vendor
Google
Vendor
CVE Published:
30 June 2021

Summary

A vulnerability exists in TensorFlow's Keras utility, specifically in the method tf.keras.utils.get_file, which allows attackers to overwrite arbitrary files when extracting crafted archives. This arises when the extraction feature is used with untrusted archive sources. This behavior raises concerns for applications relying on this function, particularly in scenarios where unverified archives may be processed.

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.