CVE-2021-41127

Rasa is an open source machine learning framework to automate text-and voice-based conversations. In affected versions a vulnerability exists in the functionality that loads a trained model `tar.gz` file which allows a malicious actor to craft a `model.tar.gz` file which can overwrite or replace bot files in the bot directory. The vulnerability is fixed in Rasa 2.8.10. For users unable to update ensure that users do not upload untrusted model files, and restrict CLI or API endpoint access where a malicious actor could target a deployed Rasa instance.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rasa:rasa:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
References () https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989 - Patch, Third Party Advisory () https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989 - Patch, Third Party Advisory
References () https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx - Third Party Advisory () https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx - Third Party Advisory
CVSS v2 : 5.8
v3 : 7.1
v2 : 5.8
v3 : 7.3

Information

Published : 2021-10-21 21:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41127

Mitre link : CVE-2021-41127

CVE.ORG link : CVE-2021-41127


JSON object : View

Products Affected

rasa

  • rasa
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal