We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A TarSlip vulnerability exists in the deepjavalibrary/djl, affecting version 0.26.0 and fixed in version 0.27.0. This vulnerability allows an attacker to manipulate file paths within tar archives to overwrite arbitrary files on the target system. Exploitation of this vulnerability could lead to remote code execution, privilege escalation, data theft or manipulation, and denial of service. The vulnerability is due to improper validation of file paths during the extraction of tar files, as demonstrated in multiple occurrences within the library's codebase, including but not limited to the files_util.py and extract_imagenet.py scripts.
Reserved 2024-03-26 | Published 2024-06-06 | Updated 2024-08-01 | Assigner @huntr_aiCWE-29 Path Traversal: '\..\filename'
huntr.com/bounties/b064bd2f-bf6e-4fc0-898e-7d02a9b97e24
github.com/...ommit/5235be508cec9e8cb6f496a4ed2fa40e4f62c370
Support options