
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-43496 affects the Clustering project's master branch (commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70) and involves a directory traversal vulnerability. The vulnerability was discovered and disclosed in November 2021, affecting the project's visualize.py component. This security flaw allows attackers to access files stored outside the intended web root folder through path manipulation (GitHub Issue).
The vulnerability stems from improper implementation of the send_from_directory Flask function in visualize.py. The flaw exists in lines 33-36 where the fpath parameter is passed to send_from_directory without proper validation. The CVSS v3.1 base score is 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating a serious security risk with network vector and no required privileges or user interaction (NVD).
The vulnerability enables attackers to access critical secrets stored anywhere on the affected system through directory traversal techniques. By manipulating variables with '../' sequences or using absolute file paths, attackers can potentially access arbitrary files including application source code, configuration files, and critical system files (GitHub Issue).
The recommended fix is to implement strict validation of file and path parameters using a fixed whitelist of possible values. This prevents arbitrary path traversal attempts by restricting the accessible paths to only those that are explicitly allowed (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."