CVE-2024-8769: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aimhubio aimhubio/aim
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
CVE-2024-8769: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aimhubio aimhubio/aim
Description
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-09-12T21:42:09.583Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2e178f764e1f470e84
Added to database: 10/15/2025, 1:01:34 PM
Last updated: 10/15/2025, 1:04:21 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-1796: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in langgenius langgenius/dify
HighCVE-2025-1451: CWE-770 Allocation of Resources Without Limits or Throttling in parisneo parisneo/lollms-webui
HighCVE-2025-1040: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in significant-gravitas significant-gravitas/autogpt
HighCVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
HighCVE-2025-0508: CWE-328 Reversible One-Way Hash in aws aws/sagemaker-python-sdk
MediumActions
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.