CVE-2024-6829 – aim
Package
Manager: pip
Name: aim
Vulnerable Version: >=0 <=3.19.3
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00066 pctl0.20702
Details
Aim External Control of File Name or Path vulnerability A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to exploit the `tarfile.extractall()` function to extract the contents of a maliciously crafted tarfile to arbitrary locations on the host server. The attacker can control `repo.path` and `run_hash` to bypass directory existence checks and extract files to unintended locations, potentially overwriting critical files. This can lead to arbitrary data being written to arbitrary locations on the remote tracking server, which could be used for further attacks such as writing a new SSH key to the target server.
Metadata
Created: 2025-03-20T12:32:45Z
Modified: 2025-03-21T18:57:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-75px-35p4-qq6h/GHSA-75px-35p4-qq6h.json
CWE IDs: ["CWE-73"]
Alternative ID: GHSA-75px-35p4-qq6h
Finding: F098
Auto approve: 1