Dataset Viewer
The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.
YAML Metadata Warning: empty or missing yaml metadata in repo card (https://huggingface.co/docs/hub/datasets-cards)
Eclipse Deeplearning4j Unrestricted Deserialization (CWE-502)
Vulnerability
Root cause: ModelSerializer.java uses ObjectInputStream.readObject() with zero restrictions at 7+ locations. A crafted .dl4j model file (ZIP) with a malicious preprocessor.bin entry achieves arbitrary code execution.
commons-collections:3.2.2 and commons-collections4:4.1 are direct dependencies, providing well-known gadget chains on the classpath.
Vulnerable Code
// ModelSerializer.java:390-401
byte[] prep = zipFile.get(PREPROCESSOR_BIN);
if (prep != null) {
ObjectInputStream ois = new ObjectInputStream(stream);
preProcessor = (DataSetPreProcessor) ois.readObject(); // ACE!
// Cast happens AFTER readObject() — too late
}
Impact
- Arbitrary Code Execution via Java deserialization gadget chains
- 7+ unrestricted
ObjectInputStream.readObject()locations - Zero
ObjectInputFilter, zeroresolveClassoverride, zero allowlist - Model files shared via repos, pipelines — single file = full RCE
Fix
Add ObjectInputFilter or resolveClass override to restrict deserializable classes.
- Downloads last month
- 14