A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
References
Configurations
History
01 Apr 2025, 20:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7 - Exploit | |
First Time |
Aimstack
Aimstack aim |
|
CWE | CWE-22 | |
CPE | cpe:2.3:a:aimstack:aim:*:*:*:*:*:*:*:* |
20 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7 - | |
Summary |
|
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-04-01 20:30
NVD link : CVE-2024-8769
Mitre link : CVE-2024-8769
CVE.ORG link : CVE-2024-8769
JSON object : View
Products Affected
aimstack
- aim