Home » Database

AVID-2026-R1500

Description

Path thraversal in DeepJavaLibrary (CVE-2024-37902)

Details

DeepJavaLibrary(DJL) is an Engine-Agnostic Deep Learning Framework in Java. DJL versions 0.1.0 through 0.27.0 do not prevent absolute path archived artifacts from inserting archived files directly into the system, overwriting system files. This is fixed in DJL 0.28.0 and patched in DJL Large Model Inference containers version 0.27.0. Users are advised to upgrade.

Reason for inclusion in AVID: CVE-2024-37902 describes a path traversal vulnerability in DeepJavaLibrary (DJL) affecting versions 0.1.0–0.27.0, allowing an attacker to insert archived files and overwrite system files when unpacking archives. DJL is a Java-based deep learning library used in AI workloads (models, pipelines, deployment tooling), making this a software supply-chain vulnerability within AI ecosystems. The issue is fixed in DJL 0.28.0 (and patched in container images), with clear references (NVD entry, GitHub advisory, release notes). This fits AI-related, supply-chain, security/vulnerability criteria with sufficient evidence.

References

Affected or Relevant Artifacts

  • Developer: deepjavalibrary
  • Deployer: deepjavalibrary
  • Artifact Details:
TypeName
Systemdjl

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score10.0
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-22CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-06-17
  • Version: 0.3.3
  • AVID Entry