We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-8238

Unrestricted Code Execution in aimhubio/aim



Description

In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side secrets or potentially gain unrestricted code execution. The vulnerability arises because str.format_map() can read arbitrary attributes of Python objects, enabling attackers to access sensitive variables such as os.environ. If an attacker can write files to a known location on the Aim server, they can use str.format_map() to load a malicious .dll/.so file into the Python interpreter, leading to unrestricted code execution.

Reserved 2024-08-27 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


MEDIUM: 5.9CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-284 Improper Access Control

Product status

Any version
affected

References

huntr.com/bounties/4e140ef9-f6d1-4e68-a44c-3b9e856924d3

cve.org (CVE-2024-8238)

nvd.nist.gov (CVE-2024-8238)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-8238

Support options

Helpdesk Chat, Email, Knowledgebase