9.1
CVSSv3

CVE-2021-35958

Published: 30/06/2021 Updated: 17/05/2024
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 571
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

TensorFlow up to and including 2.5.0 allows malicious users to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google tensorflow

Vendor Advisories

** DISPUTED ** TensorFlow through 250 allows attackers to overwrite arbitrary files via a crafted archive when tfkerasutilsget_file is used with extract=True NOTE: the vendor's position is that tfkerasutilsget_file is not intended for untrusted archives ...