Advisory #52
Title | Keras arbitrary file overwrite via path traversal in "keras.utils.get_file" |
CVE ID | CVE-2021-35958 |
Vendor | Keras Team |
Affected product | Keras |
Affected versions | <= latest |
Vulnerability type | CWE-22 (Path Traversal) |
Description | DISPUTED: Keras has a vulnerability that allows a malicious archive file to overwrite arbitrary files on the machine via "keras.utils.get_file" function with "extract=True". NOTE: The vendor states that "Security conscious users would check the file, especially if they also pass the extract flag" (I've published this advisory to notify users.) |
Status | No fix available |
Recommendation | Do not use "keras.utils.get_file" to extract contents of untrusted archive file. |