Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BlackDuck reports arbitrary file write vulnerability in "get_file" function #20980

Open
grimsi opened this issue Mar 3, 2025 · 0 comments
Open
Assignees
Labels
keras-team-review-pending Pending review by a Keras team member.

Comments

@grimsi
Copy link

grimsi commented Mar 3, 2025

Duplicate of #20795 but the original issue has already been closed without resolution.
The issue is still present in our most recent BlackDuck scans.

According to the GitHub security advisory the issue does not originate from Palo Alto Firewalls, but from the "get_file" functionality in Keras. Here is the vulnerable code (according to GH):

archive.extractall(

Here is the CVE: https://www.cve.org/CVERecord?id=CVE-2024-55459

It's hard to verify the vulnerability since the original write-up is not accessible any more.
If you require further information I will give my best to provide it.
Any feedback would be appreciated (acknowledgement of the issue or confirmation of a false positive).

Thank you very much in advance!

@sonali-kumari1 sonali-kumari1 added the keras-team-review-pending Pending review by a Keras team member. label Mar 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
keras-team-review-pending Pending review by a Keras team member.
Projects
None yet
Development

No branches or pull requests

3 participants