CVE-2021-43775
Published on: Not Yet Published
Last Modified on: 05/16/2022 11:21:00 PM UTC
Certain versions of Aim from Aimstack contain the following vulnerability:
Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0.
- CVE-2021-43775 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
aimhubio - aim version < 3.1.0
CVSS3 Score: 8.6 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | HIGH | NONE | NONE |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Arbitrary file reading vulnerability · Advisory · aimhubio/aim · GitHub | github.com text/html |
![]() |
Security issue fix for `/static-files/{path}` endpoint by mihran113 · Pull Request #1003 · aimhubio/aim · GitHub | github.com text/html |
![]() |
Security vulnerabilty · Issue #999 · aimhubio/aim · GitHub | github.com text/html |
![]() |
aim/views.py at 0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce · aimhubio/aim · GitHub | github.com text/html |
![]() |
Security issue fix for `/static-files/{path}` endpoint by mihran113 · Pull Request #1003 · aimhubio/aim · GitHub | github.com text/html |
![]() |
Related QID Numbers
- 980005 Python (pip) Security Update for aim (GHSA-8phj-f9w2-cjcc)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Aimstack | Aim | All | All | All | All |
- cpe:2.3:a:aimstack:aim:*:*:*:*:*:python:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-43775 : Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prio… twitter.com/i/web/status/1… | 2021-11-23 21:07:30 |