Aimstack

Aim

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.47%
  • Veröffentlicht 22.07.2025 00:00:00
  • Zuletzt bearbeitet 11.09.2025 16:24:05

Cross-site Scripting (XSS) in aimhubio Aim 3.28.0 allows remote attackers to execute arbitrary JavaScript in victims browsers via malicious Python code submitted to the /api/reports endpoint, which is interpreted and executed by Pyodide when the repo...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 22.07.2025 00:00:00
  • Zuletzt bearbeitet 11.09.2025 16:26:40

Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during res...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 29.05.2025 15:15:34
  • Zuletzt bearbeitet 19.09.2025 17:17:50

A vulnerability classified as critical was found in aimhubio aim up to 3.29.1. This vulnerability affects the function RestrictedPythonQuery of the file /aim/storage/query.py of the component run_view Object Handler. The manipulation of the argument ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.03.2025 10:11:29
  • Zuletzt bearbeitet 01.04.2025 20:32:35

A stored cross-site scripting (XSS) vulnerability exists in the Text Explorer component of aimhubio/aim version 3.23.0. The vulnerability arises due to the use of `dangerouslySetInnerHTML` without proper sanitization, allowing arbitrary JavaScript ex...

Exploit
  • EPSS 0.53%
  • Veröffentlicht 20.03.2025 10:11:22
  • Zuletzt bearbeitet 15.10.2025 13:15:55

A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalizati...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.03.2025 10:11:15
  • Zuletzt bearbeitet 18.07.2025 20:01:55

A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service through the misuse of the sshfs-client. The tracking server, which is single-threaded, can be made unresponsive by requesting it to connect to an unresponsive socket via ss...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 20.03.2025 10:11:09
  • Zuletzt bearbeitet 15.10.2025 13:15:54

In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side se...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 20.03.2025 10:10:54
  • Zuletzt bearbeitet 15.10.2025 13:16:00

In version 3.25.0 of aimhubio/aim, the tracking server is vulnerable to a denial of service attack. The server overrides the maximum size for websocket messages, allowing very large images to be tracked. This causes the server to become unresponsive ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 20.03.2025 10:10:50
  • Zuletzt bearbeitet 23.07.2025 20:57:12

A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to exploit the `tarfile.extractall()` function to extract the contents of a maliciously crafted tarfile to arbitrary locations on the host server. The attacker can control `repo.path` ...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 20.03.2025 10:10:10
  • Zuletzt bearbeitet 15.10.2025 13:15:40

A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service (DoS) attack. The issue arises when a large number of tracked metrics are retrieved simultaneously from the Aim web API, causing the web server to become unresponsive. The ...