CVE-2024-6483: Aim Relative Path Traversal vulnerability
(updated )
A vulnerability in the runs/delete-batch
endpoint of aimhubio/aim version 3.19.3 allows for arbitrary file or directory deletion through path traversal. The endpoint does not mitigate path traversal when handling user-specified run-names, which are used to specify log/metadata files for deletion. This can be exploited to delete arbitrary files or directories, potentially causing denial of service or data loss.
References
Code Behaviors & Features
Detect and mitigate CVE-2024-6483 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →