ID |
CVE-2024-8769
|
Sažetak |
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server. |
Reference |
|
CVSS |
Base: | 9.1 |
Impact: | 5.2 |
Exploitability: | 3.9 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
Zadnje važnije ažuriranje |
01-04-2025 - 20:30 |
Objavljeno |
20-03-2025 - 10:15 |