Vulnerability Description
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aimstack | Aim | < 3.24.0 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7Exploit
- https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7Exploit
FAQ
What is CVE-2024-8769?
CVE-2024-8769 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user...
How severe is CVE-2024-8769?
CVE-2024-8769 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-8769?
Check the references section above for vendor advisories and patch information. Affected products include: Aimstack Aim.