Aim path traversal in LockManager.release_locks
Critical severity
GitHub Reviewed
Published
Mar 20, 2025
to the GitHub Advisory Database
•
Updated Mar 20, 2025
Description
Published by the National Vulnerability Database
Mar 20, 2025
Published to the GitHub Advisory Database
Mar 20, 2025
Reviewed
Mar 20, 2025
Last updated
Mar 20, 2025
A vulnerability in the
LockManager.release_locks
function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. Therun_hash
parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This vulnerability is exposed through theRepo._close_run()
method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.References