A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-07-12T00:00:14.599Z
Updated: 2024-08-01T21:41:03.285Z
Reserved: 2024-06-27T18:22:40.719Z
Link: CVE-2024-6396
Vulnrichment
Updated: 2024-08-01T21:41:03.285Z
NVD
Status : Awaiting Analysis
Published: 2024-07-12T00:15:01.647
Modified: 2024-07-12T12:49:07.030
Link: CVE-2024-6396
Redhat
No data.