2025-03-23 03:03:54 +00:00

60 lines
2.1 KiB
JSON

{
"id": "CVE-2024-6851",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:34.247",
"lastModified": "2025-03-20T10:15:34.247",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In version 3.22.0 of aimhubio/aim, the LocalFileManager._cleanup function in the aim tracking server accepts a user-specified glob-pattern for deleting files. The function does not verify that the matched files are within the directory managed by LocalFileManager, allowing a maliciously crafted glob-pattern to lead to arbitrary file deletion."
},
{
"lang": "es",
"value": "En la versi\u00f3n 3.22.0 de aimhubio/aim, la funci\u00f3n LocalFileManager._cleanup del servidor de seguimiento de AIM acepta un patr\u00f3n glob especificado por el usuario para eliminar archivos. Esta funci\u00f3n no verifica que los archivos coincidentes se encuentren en el directorio administrado por LocalFileManager, lo que permite que un patr\u00f3n glob manipulado con fines maliciosos provoque la eliminaci\u00f3n arbitraria de archivos."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/839703fb-23b7-4dc4-ae81-44cd4740d3f3",
"source": "security@huntr.dev"
}
]
}