CVE-2021-43775
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
23/11/2021
Last modified:
07/11/2023
Description
Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:aimstack:aim:*:*:*:*:*:python:*:* | 3.1.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16
- https://github.com/aimhubio/aim/issues/999
- https://github.com/aimhubio/aim/pull/1003
- https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738
- https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc



