Aim External Control of File Name or Path vulnerability
Critical severity
GitHub Reviewed
Published
Mar 20, 2025
to the GitHub Advisory Database
•
Updated Mar 21, 2025
Description
Published by the National Vulnerability Database
Mar 20, 2025
Published to the GitHub Advisory Database
Mar 20, 2025
Reviewed
Mar 21, 2025
Last updated
Mar 21, 2025
A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to exploit the
tarfile.extractall()
function to extract the contents of a maliciously crafted tarfile to arbitrary locations on the host server. The attacker can controlrepo.path
andrun_hash
to bypass directory existence checks and extract files to unintended locations, potentially overwriting critical files. This can lead to arbitrary data being written to arbitrary locations on the remote tracking server, which could be used for further attacks such as writing a new SSH key to the target server.References