CVE-2021-41127

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-41127
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41127.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-41127
Aliases
Related
Published
2021-10-21T21:15:08Z
Modified
2025-01-08T11:16:16.677268Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

Rasa is an open source machine learning framework to automate text-and voice-based conversations. In affected versions a vulnerability exists in the functionality that loads a trained model tar.gz file which allows a malicious actor to craft a model.tar.gz file which can overwrite or replace bot files in the bot directory. The vulnerability is fixed in Rasa 2.8.10. For users unable to update ensure that users do not upload untrusted model files, and restrict CLI or API endpoint access where a malicious actor could target a deployed Rasa instance.

References

Affected packages

Git / github.com/rasahq/rasa

Affected ranges

Type
GIT
Repo
https://github.com/rasahq/rasa
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.1
0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.10.6
0.11.0
0.11.1
0.11.6
0.11.7
0.12.0
0.12.0a1
0.12.0a2
0.12.0a3
0.12.0a4
0.12.0a5
0.12.0a6
0.12.1
0.12.2
0.12.3
0.12.4
0.13.0
0.13.0a4
0.13.0a5
0.13.1
0.13.2
0.13.3
0.13.4
0.13.5
0.13.6
0.13.7
0.13.8
0.13.a2
0.13.a3
0.14.0
0.14.0a1
0.14.0a2
0.14.0a4
0.14.0a5
0.14.0a6
0.14.0a7
0.14.0a8
0.14.0a9
0.14.1
0.14.2
0.14.3
0.14.4
0.14.5
0.14.6
0.15.0
0.15.0a1
0.15.0a2
0.15.0a3
0.15.0a4
0.4.2
0.5
0.6-beta
0.6.5
0.6.9
0.7.0
0.7.0a10
0.7.0a5
0.7.0a6
0.7.0a7
0.7.0a8
0.7.0a9
0.7.1
0.7.2
0.7.3
0.7.5
0.7.6
0.7.7
0.7.8
0.7.9
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.9.0
0.9.0a1
0.9.0a2
0.9.0a3
0.9.0a5
0.9.0a7
0.9.3
0.9.4
0.9.5
0.9.6

1.*

1.0.0
1.0.0a1
1.0.0a2
1.0.0a3
1.0.0a4
1.0.0a5
1.0.0rc1
1.0.0rc10
1.0.0rc11
1.0.0rc12
1.0.0rc2
1.0.0rc3
1.0.0rc4
1.0.0rc5
1.0.0rc6
1.0.0rc7
1.0.0rc8
1.0.0rc9
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.1.8
1.10.0
1.10.0-alpha1
1.10.1
1.10.10
1.10.11
1.10.12
1.10.13
1.10.14
1.10.15
1.10.16
1.10.17
1.10.18
1.10.19
1.10.2
1.10.20
1.10.3
1.10.4
1.10.5
1.10.6
1.10.7
1.10.8
1.10.9
1.2.0
1.2.0a1
1.2.0a2
1.2.0a3
1.2.0a4
1.2.0a5
1.2.0a6
1.2.0a7
1.2.1
1.2.10
1.2.11
1.2.12
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.7.ssl_fix
1.2.8
1.2.9
1.3.0
1.3.0a1
1.3.0a2
1.3.1
1.3.10
1.3.1a1
1.3.1a10
1.3.1a11
1.3.1a12
1.3.1a13
1.3.1a14
1.3.1a2
1.3.1a3
1.3.1a4
1.3.1a5
1.3.1a6
1.3.1a7
1.3.1a8
1.3.1a9
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.3.9
1.4.0
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.5.0
1.5.1
1.5.2
1.5.3
1.6.0
1.6.0a1
1.6.0a2
1.6.1
1.6.2
1.7.0
1.7.1
1.7.2
1.7.3
1.8.0
1.8.1
1.8.2
1.8.3
1.9.0
1.9.1
1.9.2
1.9.3
1.9.4
1.9.5
1.9.6
1.9.7

2.*

2.0.0
2.0.0a1
2.0.0a2
2.0.0a3
2.0.0a4
2.0.0a5
2.0.0a6
2.0.0a7
2.0.0rc1
2.0.0rc2
2.0.0rc3
2.0.0rc4
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.1.0
2.1.1
2.1.2
2.1.3
2.2.0a1
2.2.1
2.2.10
2.2.2
2.2.3
2.2.4
2.2.4a1
2.2.5
2.2.6
2.2.7
2.2.8
2.2.9
2.3.0
2.3.1
2.3.2
2.3.3
2.3.4
2.4.0
2.4.1
2.4.2
2.4.3
2.5.0
2.5.1
2.6.0
2.6.1
2.6.2
2.6.3
2.7.0
2.7.1
2.8.1
2.8.2
2.8.3
2.8.4
2.8.5
2.8.6
2.8.7
2.8.8
2.8.9

Other

production-server-dev