logo

CVE-2024-8769 aim

Package

Manager: pip
Name: aim
Vulnerable Version: >=3.15.0 <=3.27.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00355 pctl0.57054

Details

Aim path traversal in LockManager.release_locks A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.

Metadata

Created: 2025-03-20T12:32:48Z
Modified: 2025-03-20T20:54:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-4qcx-jx49-6qrh/GHSA-4qcx-jx49-6qrh.json
CWE IDs: ["CWE-22", "CWE-29"]
Alternative ID: GHSA-4qcx-jx49-6qrh
Finding: F063
Auto approve: 1