CVE-2024-8769

A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aimstack:aim:*:*:*:*:*:*:*:*

History

01 Apr 2025, 20:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-22
First Time Aimstack aim
Aimstack
CPE cpe:2.3:a:aimstack:aim:*:*:*:*:*:*:*:*
References () https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7 - () https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7 - Exploit

20 Mar 2025, 13:15

Type Values Removed Values Added
CWE CWE-29

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-04-01 20:30


NVD link : CVE-2024-8769

Mitre link : CVE-2024-8769


JSON object : View

Products Affected

aimstack

  • aim
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')