The chainer/chainerrl-visualizer repository through 0.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/github/securitylab/issues/669#issuecomment-1117265726 | Exploit Issue Tracking Third Party Advisory | 
| https://github.com/github/securitylab/issues/669#issuecomment-1117265726 | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:04
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/github/securitylab/issues/669#issuecomment-1117265726 - Exploit, Issue Tracking, Third Party Advisory | 
Information
                Published : 2022-07-11 01:15
Updated : 2024-11-21 07:04
NVD link : CVE-2022-31573
Mitre link : CVE-2022-31573
CVE.ORG link : CVE-2022-31573
JSON object : View
Products Affected
                chainer
- chainerrl-visualizer
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
