AVID-2026-R1455
Description
TarSlip Vulnerability in deepjavalibrary/djl (CVE-2024-2914)
Details
A TarSlip vulnerability exists in the deepjavalibrary/djl, affecting version 0.26.0 and fixed in version 0.27.0. This vulnerability allows an attacker to manipulate file paths within tar archives to overwrite arbitrary files on the target system. Exploitation of this vulnerability could lead to remote code execution, privilege escalation, data theft or manipulation, and denial of service. The vulnerability is due to improper validation of file paths during the extraction of tar files, as demonstrated in multiple occurrences within the library’s codebase, including but not limited to the files_util.py and extract_imagenet.py scripts.
Reason for inclusion in AVID: CVE-2024-2914 is a TarSlip path-traversal vulnerability in the DJL (deepjavalibrary/djl) library that allows manipulation of tar extraction resulting in potential RCE, privilege escalation, data theft/manipulation, and DoS. The library is used as part of AI workflows (model loading/training/deployment) and is a dependency in AI software stacks, making this a software supply-chain vulnerability affecting AI systems. The advisory provides CVE, CWE, CVSS metrics, and remediation (version 0.27.0+).
References
- NVD entry
- https://huntr.com/bounties/b064bd2f-bf6e-4fc0-898e-7d02a9b97e24
- https://github.com/deepjavalibrary/djl/commit/5235be508cec9e8cb6f496a4ed2fa40e4f62c370
Affected or Relevant Artifacts
- Developer: deepjavalibrary
- Deployer: deepjavalibrary
- Artifact Details:
| Type | Name |
|---|---|
| System | deepjavalibrary/djl |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Base Score | 7.8 |
| Base Severity | 🔴 High |
| Attack Vector | LOCAL |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-29 | CWE-29 Path Traversal: ‘..\filename’ |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-06-06
- Version: 0.3.3
- AVID Entry