A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution.
References
Configurations
No configuration.
History
21 Nov 2024, 09:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/c1b17afd-4656-47bb-8310-686a9e1b04a0 - |
12 Jul 2024, 12:49
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Jul 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution. |
12 Jul 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-12 00:15
Updated : 2024-11-21 09:49
NVD link : CVE-2024-6396
Mitre link : CVE-2024-6396
CVE.ORG link : CVE-2024-6396
JSON object : View
Products Affected
No product.
CWE
CWE-29
Path Traversal: '\..\filename'