CVE-2024-6829: Aim External Control of File Name or Path vulnerability
(updated )
A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to exploit the tarfile.extractall()
function to extract the contents of a maliciously crafted tarfile to arbitrary locations on the host server. The attacker can control repo.path
and run_hash
to bypass directory existence checks and extract files to unintended locations, potentially overwriting critical files. This can lead to arbitrary data being written to arbitrary locations on the remote tracking server, which could be used for further attacks such as writing a new SSH key to the target server.
References
Code Behaviors & Features
Detect and mitigate CVE-2024-6829 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →