Описание
A vulnerability in the LockManager.release_locks function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The run_hash parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the Repo._close_run() method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
Уязвимые конфигурации
Конфигурация 1Версия до 3.24.0 (исключая)
cpe:2.3:a:aimstack:aim:*:*:*:*:*:*:*:*
EPSS
Процентиль: 72%
0.00706
Низкий
9.1 Critical
CVSS3
9.1 Critical
CVSS3
Дефекты
CWE-22
CWE-22
Связанные уязвимости
EPSS
Процентиль: 72%
0.00706
Низкий
9.1 Critical
CVSS3
9.1 Critical
CVSS3
Дефекты
CWE-22
CWE-22