GluonCV Arbitrary File Write via TarSlip
High severity
GitHub Reviewed
Published
Mar 20, 2025
to the GitHub Advisory Database
•
Updated Mar 21, 2025
Description
Published by the National Vulnerability Database
Mar 20, 2025
Published to the GitHub Advisory Database
Mar 20, 2025
Reviewed
Mar 21, 2025
Last updated
Mar 21, 2025
A vulnerability in the
ImageClassificationDataset.from_csv()
API of thedmlc/gluon-cv
repository, version 0.10.0, allows for arbitrary file write. The function downloads and extractstar.gz
files from URLs without proper sanitization, making it susceptible to a TarSlip vulnerability. Attackers can exploit this by crafting malicious tar files that, when extracted, can overwrite files on the victim's system via path traversal or faked symlinks.References