Arbitrary File Creation and Code Execution via FileUtil.extract() in TensorflowModel

Arbitrary File Creation and Code Execution via FileUtil.extract() in TensorflowModel

CVE-2023-5245 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

FileUtil.extract() enumerates all zip file entries and extracts each file without validating whether file paths in the archive are outside the intended directory. When creating an instance of TensorflowModel using the saved_model format and an exported tensorflow model, the apply() function invokes the vulnerable implementation of FileUtil.extract(). Arbitrary file creation can directly lead to code execution

Learn more about our Web Application Penetration Testing UK.