Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-0851 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in Deep Java Library (DJL) allows writing files to arbitrary locations. πŸ’₯ **Consequences**: Full system compromise, data corruption, or RCE via malicious model archives.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-36 (Path Traversal). πŸ› **Flaw**: `ZipUtils.unzip` and `TarUtils.untar` fail to sanitize filenames, allowing `../` sequences to escape the target directory.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: AWS Deep Java Library (DJL). πŸ“¦ **Versions**: All versions **prior to 0.31.1**. 🧩 **Component**: Model loading utilities for ZIP/TAR archives.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Write arbitrary files to the file system (e.g., `C:\Windows\System32\`). πŸ“Š **Impact**: High Confidentiality, Integrity, and Availability loss. Potential for Remote Code Execution (RCE).

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. πŸ”“ **Auth**: None required (PR:N). 🌐 **Vector**: Network (AV:N). πŸ–±οΈ **UI**: None required (UI:N). Simply loading a malicious model triggers it.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploit**: YES. πŸ“‚ **PoC**: Available on GitHub (skrkcb2/CVE-2025-0851). πŸ§ͺ **Proof**: Successfully created files in `System32` using crafted JAR/TAR files.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for DJL versions < 0.31.1. πŸ“¦ **Dependency Audit**: Check `pom.xml` or `build.gradle` for `ai.djl` dependencies. 🚩 **Flag**: Look for usage of `ZipUtils` or `TarUtils` without validation.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: YES. πŸ“… **Patch**: Released in **v0.31.1**. πŸ”— **Source**: GitHub releases and AWS Security Bulletin AWS-2025-003.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: If unpatched, **disable automatic model extraction** from untrusted sources. 🚫 **Mitigation**: Validate archive contents manually before loading.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. 🚨 **Priority**: P1. ⏱️ **Action**: Patch immediately. CVSS Score is **9.8** (Critical). Wild exploits exist. Do not delay.