CVE-2024-12216 – gluoncv
Package
Manager: pip
Name: gluoncv
Vulnerable Version: >=0 <=0.10.0
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0003 pctl0.06808
Details
GluonCV Arbitrary File Write via TarSlip A vulnerability in the `ImageClassificationDataset.from_csv()` API of the `dmlc/gluon-cv` repository, version 0.10.0, allows for arbitrary file write. The function downloads and extracts `tar.gz` files from URLs without proper sanitization, making it susceptible to a TarSlip vulnerability. Attackers can exploit this by crafting malicious tar files that, when extracted, can overwrite files on the victim's system via path traversal or faked symlinks.
Metadata
Created: 2025-03-20T12:32:42Z
Modified: 2025-03-21T17:03:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-m724-hqmc-ggpx/GHSA-m724-hqmc-ggpx.json
CWE IDs: ["CWE-20", "CWE-22"]
Alternative ID: GHSA-m724-hqmc-ggpx
Finding: F063
Auto approve: 1