Advisory #52
| Title | Keras arbitrary file overwrite via path traversal in "keras.utils.get_file" |
| CVE ID | CVE-2021-35958 |
| Vendor | Keras Team |
| Affected product | Keras |
| Affected versions | <= latest |
| Vulnerability type | CWE-22 (Path Traversal) |
| Description | DISPUTED: Keras has a vulnerability that allows a malicious archive file to overwrite arbitrary files on the machine via "keras.utils.get_file" function with "extract=True". NOTE: The vendor states that "Security conscious users would check the file, especially if they also pass the extract flag" (I've published this advisory to notify users.) |
| Status | No fix available |
| Recommendation | Do not use "keras.utils.get_file" to extract contents of untrusted archive file. |