CVE-2024-8238 – aim
Package
Manager: pip
Name: aim
Vulnerable Version: >=3.0.0 <=3.22.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00082 pctl0.24807
Details
Aim Improper Access Control In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side secrets or potentially gain unrestricted code execution. The vulnerability arises because str.format_map() can read arbitrary attributes of Python objects, enabling attackers to access sensitive variables such as os.environ. If an attacker can write files to a known location on the Aim server, they can use str.format_map() to load a malicious .dll/.so file into the Python interpreter, leading to unrestricted code execution.
Metadata
Created: 2025-03-20T12:32:47Z
Modified: 2025-03-20T20:41:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-r229-5wgf-f28g/GHSA-r229-5wgf-f28g.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-r229-5wgf-f28g
Finding: F039
Auto approve: 1