A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution.
References
Link | Resource |
---|---|
https://huntr.com/bounties/c1b17afd-4656-47bb-8310-686a9e1b04a0 | Exploit Third Party Advisory |
https://huntr.com/bounties/c1b17afd-4656-47bb-8310-686a9e1b04a0 | Exploit Third Party Advisory |
Configurations
History
23 Jul 2025, 20:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Aimstack aim
Aimstack |
|
CPE | cpe:2.3:a:aimstack:aim:3.19.3:*:*:*:*:python:*:* | |
References | () https://huntr.com/bounties/c1b17afd-4656-47bb-8310-686a9e1b04a0 - Exploit, Third Party Advisory |
Information
Published : 2024-07-12 00:15
Updated : 2025-07-23 20:56
NVD link : CVE-2024-6396
Mitre link : CVE-2024-6396
CVE.ORG link : CVE-2024-6396
JSON object : View
Products Affected
aimstack
- aim
CWE
CWE-29
Path Traversal: '\..\filename'