Vulnerability Details : CVE-2021-43775
Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)� sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0.
Vulnerability category: Directory traversal
Products affected by CVE-2021-43775
- cpe:2.3:a:aimstack:aim:*:*:*:*:*:python:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-43775
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-43775
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
3.9
|
4.0
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
3.9
|
4.0
|
GitHub, Inc. |
CWE ids for CVE-2021-43775
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Primary)
References for CVE-2021-43775
-
https://github.com/aimhubio/aim/issues/999
Security vulnerabilty · Issue #999 · aimhubio/aim · GitHubIssue Tracking;Third Party Advisory
-
https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc
Arbitrary file reading vulnerability · Advisory · aimhubio/aim · GitHubExploit;Third Party Advisory
-
https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738
Security issue fix for `/static-files/{path}` endpoint by mihran113 · Pull Request #1003 · aimhubio/aim · GitHubPatch
-
https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16
aim/views.py at 0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce · aimhubio/aim · GitHubProduct
-
https://github.com/aimhubio/aim/pull/1003
Security issue fix for `/static-files/{path}` endpoint by mihran113 · Pull Request #1003 · aimhubio/aim · GitHubPatch;Third Party Advisory
Jump to