Логотип exploitDog
bind:CVE-2024-8769
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-8769

Количество 2

Количество 2

nvd логотип

CVE-2024-8769

11 месяцев назад

A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-4qcx-jx49-6qrh

11 месяцев назад

Aim path traversal in LockManager.release_locks

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-8769

A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.

CVSS3: 9.1
1%
Низкий
11 месяцев назад
github логотип
GHSA-4qcx-jx49-6qrh

Aim path traversal in LockManager.release_locks

CVSS3: 9.1
1%
Низкий
11 месяцев назад

Уязвимостей на страницу