CVE-2024-12216: CWE-59 Improper Link Resolution Before File Access in dmlc dmlc/gluon-cv
A vulnerability in the `ImageClassificationDataset.from_csv()` API of the `dmlc/gluon-cv` repository, version 0.10.0, allows for arbitrary file write. The function downloads and extracts `tar.gz` files from URLs without proper sanitization, making it susceptible to a TarSlip vulnerability. Attackers can exploit this by crafting malicious tar files that, when extracted, can overwrite files on the victim's system via path traversal or faked symlinks.
AI Analysis
Technical Summary
CVE-2024-12216 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) found in the dmlc/gluon-cv repository, specifically in the ImageClassificationDataset.from_csv() API. This function downloads and extracts tar.gz files from user-supplied URLs without adequate sanitization or validation of the archive contents. The vulnerability arises from a TarSlip attack vector, where maliciously crafted tar archives contain path traversal sequences (e.g., '../') or symbolic links that redirect extraction paths outside the intended directory. When such a tar.gz file is processed, it can overwrite arbitrary files on the host system, potentially replacing critical system or application files. The CVSS v3.0 score of 7.1 reflects a high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction (UI:R) is necessary. The impact primarily affects integrity and availability, as attackers can modify or delete files, potentially leading to denial of service or further compromise. No patches or known exploits are currently documented, but the vulnerability poses a significant risk in environments where untrusted tar.gz files are processed automatically or without sufficient validation.
Potential Impact
For European organizations, especially those involved in AI, machine learning, and data science that utilize the dmlc/gluon-cv library, this vulnerability poses a significant risk. Successful exploitation can lead to arbitrary file overwrites, potentially compromising system stability, application integrity, and availability of critical services. This could result in data loss, service disruption, or a foothold for further attacks such as privilege escalation or persistent malware installation. Given the increasing reliance on AI frameworks in sectors like finance, healthcare, and manufacturing across Europe, the impact could extend to critical infrastructure and sensitive data environments. The requirement for user interaction limits remote exploitation but does not eliminate risk, particularly in development or CI/CD pipelines where automated processes might handle untrusted tar.gz files. The absence of known exploits suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
To mitigate CVE-2024-12216, organizations should implement strict validation and sanitization of tar.gz archives before extraction. This includes checking for path traversal sequences and symbolic links that could redirect extraction outside the intended directory. Employ extraction libraries or tools that enforce safe extraction policies, such as extracting only within a designated sandbox directory. Avoid processing tar.gz files from untrusted or unauthenticated sources, and if necessary, scan archives for malicious content prior to use. Monitor and restrict user permissions to limit the impact of arbitrary file writes. Since no official patches are currently available, consider contributing or requesting fixes from the dmlc/gluon-cv maintainers. Additionally, incorporate security controls in CI/CD pipelines to detect and block malicious archives. Regularly audit systems for unexpected file modifications and maintain backups to recover from potential overwrites.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2024-12216: CWE-59 Improper Link Resolution Before File Access in dmlc dmlc/gluon-cv
Description
A vulnerability in the `ImageClassificationDataset.from_csv()` API of the `dmlc/gluon-cv` repository, version 0.10.0, allows for arbitrary file write. The function downloads and extracts `tar.gz` files from URLs without proper sanitization, making it susceptible to a TarSlip vulnerability. Attackers can exploit this by crafting malicious tar files that, when extracted, can overwrite files on the victim's system via path traversal or faked symlinks.
AI-Powered Analysis
Technical Analysis
CVE-2024-12216 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) found in the dmlc/gluon-cv repository, specifically in the ImageClassificationDataset.from_csv() API. This function downloads and extracts tar.gz files from user-supplied URLs without adequate sanitization or validation of the archive contents. The vulnerability arises from a TarSlip attack vector, where maliciously crafted tar archives contain path traversal sequences (e.g., '../') or symbolic links that redirect extraction paths outside the intended directory. When such a tar.gz file is processed, it can overwrite arbitrary files on the host system, potentially replacing critical system or application files. The CVSS v3.0 score of 7.1 reflects a high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction (UI:R) is necessary. The impact primarily affects integrity and availability, as attackers can modify or delete files, potentially leading to denial of service or further compromise. No patches or known exploits are currently documented, but the vulnerability poses a significant risk in environments where untrusted tar.gz files are processed automatically or without sufficient validation.
Potential Impact
For European organizations, especially those involved in AI, machine learning, and data science that utilize the dmlc/gluon-cv library, this vulnerability poses a significant risk. Successful exploitation can lead to arbitrary file overwrites, potentially compromising system stability, application integrity, and availability of critical services. This could result in data loss, service disruption, or a foothold for further attacks such as privilege escalation or persistent malware installation. Given the increasing reliance on AI frameworks in sectors like finance, healthcare, and manufacturing across Europe, the impact could extend to critical infrastructure and sensitive data environments. The requirement for user interaction limits remote exploitation but does not eliminate risk, particularly in development or CI/CD pipelines where automated processes might handle untrusted tar.gz files. The absence of known exploits suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
To mitigate CVE-2024-12216, organizations should implement strict validation and sanitization of tar.gz archives before extraction. This includes checking for path traversal sequences and symbolic links that could redirect extraction outside the intended directory. Employ extraction libraries or tools that enforce safe extraction policies, such as extracting only within a designated sandbox directory. Avoid processing tar.gz files from untrusted or unauthenticated sources, and if necessary, scan archives for malicious content prior to use. Monitor and restrict user permissions to limit the impact of arbitrary file writes. Since no official patches are currently available, consider contributing or requesting fixes from the dmlc/gluon-cv maintainers. Additionally, incorporate security controls in CI/CD pipelines to detect and block malicious archives. Regularly audit systems for unexpected file modifications and maintain backups to recover from potential overwrites.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-12-04T22:00:51.682Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b24178f764e1f470ae4
Added to database: 10/15/2025, 1:01:24 PM
Last enriched: 10/15/2025, 1:22:15 PM
Last updated: 10/16/2025, 2:53:15 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumCVE-2025-46752: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.