strands-agents@1.4.0 vulnerabilities

A model-driven approach to building AI agents in just a few lines of code

  • latest version

    1.13.0

  • latest non vulnerable version

  • first published

    5 months ago

  • latest version published

    10 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the strands-agents package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Directory Traversal

    strands-agents is an A model-driven approach to building AI agents in just a few lines of code

    Affected versions of this package are vulnerable to Directory Traversal via the FileSessionManager._get_session_path(), FileSessionManager._get_agent_path(), S3SessionManager._get_session_path(), and S3SessionManager._get_agent_path() functions due to the lack of sanitization of the session_id and agent_id identifiers that are used to construct filesystem and S3 storage paths. An attacker can bypass the authentication process by passing a specially crafted session_id and get access to files in the restricted directory.

    How to fix Directory Traversal?

    Upgrade strands-agents to version 1.5.0 or higher.

    [,1.5.0)