CVE-2024-8769 – Aimhubio Aim File Deletion Vulnerability (Arbitrary File Deletion)

The following table lists the changes that have been made to the
CVE-2024-8769 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Mar. 20, 2025

    Action Type Old Value New Value
    Added Description A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
    Added CVSS V3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
    Added CWE CWE-29
    Added Reference https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7
Share the Post:

Related Posts