AVID-2026-R0879
Description
Shell Command Injection Vulnerability in Nimbus Thrift Server (CVE-2021-38294)
Details
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
Reason for inclusion in AVID: CVE-2021-38294 describes a remote code execution (RCE) via a crafted Thrift request against Apache Storm’s Nimbus server. Apache Storm is a data-processing framework commonly used as part of AI/ML data pipelines (ingestion/streamingprocessed data feeding models and workflows). Thus, this vulnerability affects software components that can be part of the general-purpose AI system supply chain (data pipelines, orchestration, runtimes) and represents a security vulnerability with clear evidence. While not AI-specific, it directly impacts the software stack that underpins AI deployments in production environments.
References
- NVD entry
- https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E
- https://seclists.org/oss-sec/2021/q4/44
- http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html
Affected or Relevant Artifacts
- Developer: Apache Software Foundation
- Deployer: Apache Software Foundation
- Artifact Details:
| Type | Name |
|---|---|
| System | Apache Storm |
| System | Apache Storm |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CWE
| ID | Description |
|---|---|
| CWE-74 | CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2021-10-25
- Version: 0.3.3
- AVID Entry