Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r229-5wgf-f28g

Опубликовано: 20 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Aim Improper Access Control

In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side secrets or potentially gain unrestricted code execution. The vulnerability arises because str.format_map() can read arbitrary attributes of Python objects, enabling attackers to access sensitive variables such as os.environ. If an attacker can write files to a known location on the Aim server, they can use str.format_map() to load a malicious .dll/.so file into the Python interpreter, leading to unrestricted code execution.

Пакеты

Наименование

aim

pip
Затронутые версииВерсия исправления

>= 3.0.0, <= 3.22.0

Отсутствует

EPSS

Процентиль: 49%
0.0026
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-1336
CWE-284

Связанные уязвимости

CVSS3: 8.1
nvd
11 месяцев назад

In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side secrets or potentially gain unrestricted code execution. The vulnerability arises because str.format_map() can read arbitrary attributes of Python objects, enabling attackers to access sensitive variables such as os.environ. If an attacker can write files to a known location on the Aim server, they can use str.format_map() to load a malicious .dll/.so file into the Python interpreter, leading to unrestricted code execution.

EPSS

Процентиль: 49%
0.0026
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-1336
CWE-284