Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Unrestricted Code Execution in aimhubio/aim
Vulnerability Description
In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side secrets or potentially gain unrestricted code execution. The vulnerability arises because str.format_map() can read arbitrary attributes of Python objects, enabling attackers to access sensitive variables such as os.environ. If an attacker can write files to a known location on the Aim server, they can use str.format_map() to load a malicious .dll/.so file into the Python interpreter, leading to unrestricted code execution.
CVSS Information
N/A
Vulnerability Type
CWE-1336
Vulnerability Title
Aim 访问控制错误漏洞
Vulnerability Description
Aim是美国Aim开源的一个易于使用和高性能的开源实验跟踪器。 Aim 3.22.0版本存在访问控制错误漏洞,该漏洞源于AimQL查询语言使用过时的safer_getattr函数,未保护str.format_map方法,可能导致服务器端秘密泄露或任意代码执行。
CVSS Information
N/A
Vulnerability Type
N/A