Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qcx-jx49-6qrh

Опубликовано: 20 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9.1

Описание

Aim path traversal in LockManager.release_locks

A vulnerability in the LockManager.release_locks function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The run_hash parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the Repo._close_run() method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.

Пакеты

Наименование

aim

pip
Затронутые версииВерсия исправления

>= 3.15.0, <= 3.27.0

Отсутствует

EPSS

Процентиль: 72%
0.00706
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-22
CWE-29

Связанные уязвимости

CVSS3: 9.1
nvd
11 месяцев назад

A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.

EPSS

Процентиль: 72%
0.00706
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-22
CWE-29