Path Traversal Vulnerability in Deep Java Library by Amazon Web Services
CVE-2025-0851
What is CVE-2025-0851?
CVE-2025-0851 involves a path traversal vulnerability found in the Deep Java Library (DJL), a software library provided by Amazon Web Services (AWS) that facilitates the development of machine learning applications. This vulnerability allows malicious actors to manipulate file paths in such a way that they could write files to any location on the filesystem, potentially leading to unauthorized data modification and exposure. The ability to exploit this vulnerability without adequate protection mechanisms in place could significantly disrupt operations and compromise sensitive information within an organization.
Technical Details
The vulnerability is rooted in the handling of file extraction methods within the DJL, specifically the ZipUtils.unzip
and TarUtils.untar
functions. These functions do not sufficiently validate file paths when extracting archives, enabling an attacker to create paths that traverse outside of intended directories. This mismanagement of file paths can lead to writing arbitrary files, which is a critical security oversight that can affect all platforms running the affected library.
Potential Impact of CVE-2025-0851
-
Arbitrary File System Access: The primary impact is the potential for arbitrary file system access, allowing attackers to write files to locations that could compromise the integrity and confidentiality of the system.
-
Data Breach Risk: Sensitive data could be exposed or modified as a result of unauthorized file writes, leading to significant privacy concerns and potential regulatory ramifications for organizations.
-
System Compromise: If exploited, the vulnerability could allow threat actors to manipulate application workflows or install malicious files, potentially leading to full system compromise and exploitation of further vulnerabilities within the network.
Affected Version(s)
DeepJavaLibrary MacOS 0.1.0 < 0.31.1