Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-11-23T19:15:13
Updated: 2024-08-04T04:03:08.638Z
Reserved: 2021-11-16T00:00:00
Link: CVE-2021-43775
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-11-23T21:15:20.347
Modified: 2024-11-21T06:29:45.670
Link: CVE-2021-43775
Redhat
No data.