Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 22 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 22 Jul 2025 15:30:00 +0000

Type Values Removed Values Added
Description Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-07-22T17:40:21.597Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-51463

cve-icon Vulnrichment

Updated: 2025-07-22T17:38:33.625Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-22T16:15:30.510

Modified: 2025-07-25T15:29:44.523

Link: CVE-2025-51463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.