A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.
Solution:
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/keras-team/keras/pull/21429 | patch issue tracking |
https://jfrog.com/blog/keras-safe_mode-bypass-vulnerability/ | third party advisory |