Vulnerability in Aimhubio Aim with Outdated Python Functionality
CVE-2024-8238
Summary
In version 3.22.0 of Aimhubio Aim, the AimQL query language incorporates a legacy version of the safer_getattr() function from RestrictedPython, which is not designed to mitigate the risks associated with the str.format_map() method. This vulnerability allows attackers to leak sensitive information from the server or even execute arbitrary code. By leveraging the ability of str.format_map() to access various attributes of Python objects, malicious actors can disclose critical variables, including environmental settings. If an attacker has write access to a specific location on the Aim server, they can exploit this weakness to load a harmful .dll or .so file, gaining unrestricted access to execute code within the Python interpreter.
Affected Version(s)
aimhubio/aim <= unspecified
References
CVSS V3.0
Timeline
Vulnerability published
Vulnerability Reserved