漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Arbitrary Code execution in Keras Safe Mode
Vulnerability Description
The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .keras model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by crafting a special config.json (a file within the .keras archive) that will invoke keras.config.enable_unsafe_deserialization() to disable safe mode. Once safe mode is disable, one can use the Lambda layer feature of keras, which allows arbitrary Python code in the form of pickled code. Both can appear in the same archive. Simply the keras.config.enable_unsafe_deserialization() needs to appear first in the archive and the Lambda with arbitrary code needs to be second.
CVSS Information
N/A
Vulnerability Type
可信数据的反序列化
Vulnerability Title
Keras 安全漏洞
Vulnerability Description
Keras是Keras开源的一个多后端深度学习框架。 Keras 存在安全漏洞,该漏洞源于特制的.keras模型存档可能触发任意代码执行。
CVSS Information
N/A
Vulnerability Type
N/A