Логотип exploitDog
bind:CVE-2025-12060
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-12060

Количество 5

Количество 5

ubuntu логотип

CVE-2025-12060

16 дней назад

The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can craft a malicious tar archive containing special symlinks, which, when extracted, allows them to write arbitrary files to any location on the filesystem outside of the intended destination folder. This vulnerability is linked to the underlying Python tarfile weakness, identified as CVE-2025-4517. Note that upgrading Python to one of the versions that fix CVE-2025-4517 (e.g. Python 3.13.4) is not enough. One additionally needs to upgrade Keras to a version with the fix (Keras 3.12).

EPSS: Низкий
nvd логотип

CVE-2025-12060

16 дней назад

The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can craft a malicious tar archive containing special symlinks, which, when extracted, allows them to write arbitrary files to any location on the filesystem outside of the intended destination folder. This vulnerability is linked to the underlying Python tarfile weakness, identified as CVE-2025-4517. Note that upgrading Python to one of the versions that fix CVE-2025-4517 (e.g. Python 3.13.4) is not enough. One additionally needs to upgrade Keras to a version with the fix (Keras 3.12).

EPSS: Низкий
msrc логотип

CVE-2025-12060

14 дней назад

Keras keras.utils.get_file Utility Path Traversal Vulnerability

EPSS: Низкий
debian логотип

CVE-2025-12060

16 дней назад

The keras.utils.get_file API in Keras, when used with the extract=True ...

EPSS: Низкий
github логотип

GHSA-28jp-44vh-q42h

16 дней назад

Keras keras.utils.get_file API is vulnerable to a path traversal attack

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-12060

The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can craft a malicious tar archive containing special symlinks, which, when extracted, allows them to write arbitrary files to any location on the filesystem outside of the intended destination folder. This vulnerability is linked to the underlying Python tarfile weakness, identified as CVE-2025-4517. Note that upgrading Python to one of the versions that fix CVE-2025-4517 (e.g. Python 3.13.4) is not enough. One additionally needs to upgrade Keras to a version with the fix (Keras 3.12).

0%
Низкий
16 дней назад
nvd логотип
CVE-2025-12060

The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can craft a malicious tar archive containing special symlinks, which, when extracted, allows them to write arbitrary files to any location on the filesystem outside of the intended destination folder. This vulnerability is linked to the underlying Python tarfile weakness, identified as CVE-2025-4517. Note that upgrading Python to one of the versions that fix CVE-2025-4517 (e.g. Python 3.13.4) is not enough. One additionally needs to upgrade Keras to a version with the fix (Keras 3.12).

0%
Низкий
16 дней назад
msrc логотип
CVE-2025-12060

Keras keras.utils.get_file Utility Path Traversal Vulnerability

0%
Низкий
14 дней назад
debian логотип
CVE-2025-12060

The keras.utils.get_file API in Keras, when used with the extract=True ...

0%
Низкий
16 дней назад
github логотип
GHSA-28jp-44vh-q42h

Keras keras.utils.get_file API is vulnerable to a path traversal attack

0%
Низкий
16 дней назад

Уязвимостей на страницу