Critical Vulnerability Information Vulnerability ID: #1931558 Submitter: Takashi Kajinami Submission Date: Aug 03, 2021 Change ID: I47931bdf8bbccb940d4c98c47f16a6eef27c026a Vulnerability Description This vulnerability involves an issue allowing the use of "raw" definitions. After merging change , mistralclient would determine whether the passed value is a file path name, file URI, or actual definition. However, this behavior causes problems when the client is used on the server side, allowing access to server files or any content within the internal server. Solution Introduced a new variable to disable fallback behavior, ensuring the client treats input as raw content. Related File Modifications Code Review and Verification Reviewers: Akihiro Motoki, Eyal, Adriano Petrich Final Review Status: Merged