From 6e678ee9f1a0fcf8c2ae2222bba17863ad75cd7c Mon Sep 17 00:00:00 2001 From: "Shelby J. Cunningham" Date: Wed, 24 Nov 2021 10:05:09 -0500 Subject: [PATCH] Second attempt to add CVE-2021-43775 for GHSA-8phj-f9w2-cjcc --- 2021/43xxx/CVE-2021-43775.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2021/43xxx/CVE-2021-43775.json b/2021/43xxx/CVE-2021-43775.json index ee3c2bef920..6f99549b435 100644 --- a/2021/43xxx/CVE-2021-43775.json +++ b/2021/43xxx/CVE-2021-43775.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with \u201cdot-dot-slash (../)\u201d sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0." + "value": "Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0." } ] },