Home » Database

AVID-2026-R0879

Description

Shell Command Injection Vulnerability in Nimbus Thrift Server (CVE-2021-38294)

Details

A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.

Reason for inclusion in AVID: CVE-2021-38294 describes a remote code execution (RCE) via a crafted Thrift request against Apache Storm’s Nimbus server. Apache Storm is a data-processing framework commonly used as part of AI/ML data pipelines (ingestion/streamingprocessed data feeding models and workflows). Thus, this vulnerability affects software components that can be part of the general-purpose AI system supply chain (data pipelines, orchestration, runtimes) and represents a security vulnerability with clear evidence. While not AI-specific, it directly impacts the software stack that underpins AI deployments in production environments.

References

Affected or Relevant Artifacts

  • Developer: Apache Software Foundation
  • Deployer: Apache Software Foundation
  • Artifact Details:
TypeName
SystemApache Storm
SystemApache Storm

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-74CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-10-25
  • Version: 0.3.3
  • AVID Entry