{"id":"BIT-tensorflow-2021-35958","details":"TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives","aliases":["CVE-2021-35958"],"modified":"2025-04-03T14:40:37.652Z","published":"2024-03-06T11:17:54.373Z","database_specific":{"severity":"Critical","cpes":["cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/README.md"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/blob/b8cad4c631096a34461ff8a07840d5f4d123ce32/tensorflow/python/keras/utils/data_utils.py#L137"},{"type":"WEB","url":"https://keras.io/api/"},{"type":"WEB","url":"https://vuln.ryotak.me/advisories/52"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-35958"}],"affected":[{"package":{"name":"tensorflow","ecosystem":"Bitnami","purl":"pkg:bitnami/tensorflow"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.5.1"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/tensorflow/BIT-tensorflow-2021-35958.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"}]}],"schema_version":"1.7.3"}