CVE-2024-6851

In version 3.22.0 of aimhubio/aim, the LocalFileManager._cleanup function in the aim tracking server accepts a user-specified glob-pattern for deleting files. The function does not verify that the matched files are within the directory managed by LocalFileManager, allowing a maliciously crafted glob-pattern to lead to arbitrary file deletion.
CVSS

No CVSS.

References
Link Resource
https://huntr.com/bounties/839703fb-23b7-4dc4-ae81-44cd4740d3f3 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:aimstack:aim:3.22.0:*:*:*:*:python:*:*

History

23 Jul 2025, 20:57

Type Values Removed Values Added
References () https://huntr.com/bounties/839703fb-23b7-4dc4-ae81-44cd4740d3f3 - () https://huntr.com/bounties/839703fb-23b7-4dc4-ae81-44cd4740d3f3 - Exploit, Third Party Advisory
First Time Aimstack aim
Aimstack
CPE cpe:2.3:a:aimstack:aim:3.22.0:*:*:*:*:python:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-23 20:57


NVD link : CVE-2024-6851

Mitre link : CVE-2024-6851


JSON object : View

Products Affected

aimstack

  • aim
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')