Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-6396 | First vendor Publication | 2024-07-12 |
Vendor | Cve | Last vendor Modification | 2024-07-12 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6396 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-07-13 02:43:06 |
|
2024-07-13 02:43:04 |
|
2024-07-12 13:44:14 |
|
2024-07-12 13:44:13 |
|
2024-07-12 13:27:26 |
|
2024-07-12 09:27:23 |
|