Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0851: CWE-36: Absolute Path Traversal in AWS DeepJavaLibrary

0
Critical
VulnerabilityCVE-2025-0851cvecve-2025-0851cwe-36cwe-73
Published: Wed Jan 29 2025 (01/29/2025, 21:19:59 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: DeepJavaLibrary

Description

A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.

AI-Powered Analysis

AILast updated: 10/14/2025, 18:55:06 UTC

Technical Analysis

CVE-2025-0851 is an absolute path traversal vulnerability categorized under CWE-36 and CWE-73, found in the AWS Deep Java Library (DJL) version 0.1.0. The vulnerability resides in the ZipUtils.unzip and TarUtils.untar methods, which improperly handle archive extraction paths. This flaw enables an attacker to craft malicious ZIP or TAR archives containing file paths that traverse directories (e.g., using '../') and write files outside the intended extraction directory. Because the vulnerability requires no authentication or user interaction and is remotely exploitable over the network, it poses a severe risk. Successful exploitation can lead to arbitrary file writes, potentially overwriting critical system or application files, enabling remote code execution, privilege escalation, or persistent malware installation. The vulnerability affects all platforms where DJL 0.1.0 is deployed, impacting any environment using this library for AI or machine learning tasks. Despite no known exploits in the wild, the critical CVSS score (9.3) reflects the ease of exploitation and the high impact on confidentiality, integrity, and availability. AWS has not yet released a patch, so users must apply interim mitigations to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2025-0851 can be significant, especially those leveraging AWS Deep Java Library in AI, machine learning, or data processing pipelines. Arbitrary file writes can lead to system compromise, data breaches, or disruption of critical services. Confidentiality may be breached if sensitive files are overwritten or replaced with malicious payloads. Integrity is at high risk due to potential tampering with application binaries or configuration files. Availability could be affected if critical system files are corrupted or deleted. Organizations in sectors such as finance, healthcare, and critical infrastructure, which increasingly adopt AI technologies, could face operational disruptions and regulatory consequences under GDPR if personal data is exposed or systems are compromised. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in automated or cloud environments common in Europe.

Mitigation Recommendations

Until an official patch is released by AWS, European organizations should implement the following mitigations: 1) Avoid using DJL version 0.1.0 for processing untrusted archives; 2) Implement strict input validation and sanitization to detect and block archive files containing path traversal sequences before extraction; 3) Run archive extraction processes with least privilege, restricting file system write permissions to dedicated sandbox directories; 4) Employ runtime monitoring and alerting for unexpected file writes outside designated extraction paths; 5) Use containerization or virtual machines to isolate the extraction process, limiting potential damage; 6) Keep AWS SDKs and related dependencies up to date and subscribe to AWS security advisories for patch announcements; 7) Conduct security audits of AI/ML pipelines to identify use of vulnerable DJL versions and replace or upgrade accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMZN
Date Reserved
2025-01-29T17:39:51.866Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee9ba2d8f994a66eca6017

Added to database: 10/14/2025, 6:51:14 PM

Last enriched: 10/14/2025, 6:55:06 PM

Last updated: 10/16/2025, 3:27:41 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats