We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6396

Arbitrary File Overwrite and Data Exfiltration in aimhubio/aim



Assigner@huntr_ai
Reserved2024-06-27
Published2024-07-12
Updated2024-08-01

Description

A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution.



CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-29 Path Traversal: '\..\filename'

Product status

Any version
affected

References

https://huntr.com/bounties/c1b17afd-4656-47bb-8310-686a9e1b04a0

cve.org CVE-2024-6396

nvd.nist.gov CVE-2024-6396

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.