icon

We found results for “

CVE-2024-12216

Good to know:

icon

Date: March 20, 2025

A vulnerability in the "ImageClassificationDataset.from_csv()" API of the "dmlc/gluon-cv" repository, version 0.10.0, allows for arbitrary file write. The function downloads and extracts "tar.gz" files from URLs without proper sanitization, making it susceptible to a TarSlip vulnerability. Attackers can exploit this by crafting malicious tar files that, when extracted, can overwrite files on the victim's system via path traversal or faked symlinks.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Input Validation

CWE-20

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us