CVE-2024-8769
Published: 20 March 2025
Summary
CVE-2024-8769 is a critical-severity Path Traversal (CWE-22) vulnerability in Aimstack Aim. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 20.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates and sanitizes the user-controlled run_hash parameter to block relative path traversal attempts in LockManager.release_locks.
Remediates the specific path traversal flaw in aimhubio/aim's LockManager.release_locks by applying vendor patches or code fixes promptly.
Enforces least privilege on the tracking server process to restrict file system access, limiting the impact of arbitrary deletions even if traversal succeeds.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated path traversal in public-facing tracking server API directly enables exploitation via T1190 (Exploit Public-Facing Application) and facilitates arbitrary file deletion mapped to T1485 (Data Destruction).
NVD Description
A vulnerability in the `LockManager.release_locks` function in aimhubio/aim (commit bb76afe) allows for arbitrary file deletion through relative path traversal. The `run_hash` parameter, which is user-controllable, is concatenated without normalization as part of a path used to specify file deletion. This…
more
vulnerability is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API. As a result, an attacker can exploit this to delete any arbitrary file on the machine running the tracking server.
Deeper analysisAI
CVE-2024-8769 is a path traversal vulnerability in the `LockManager.release_locks` function within aimhubio/aim at commit bb76afe, enabling arbitrary file deletion. The user-controlled `run_hash` parameter is concatenated without normalization into a path used for file deletion operations. This flaw is exposed through the `Repo._close_run()` method, which is accessible via the tracking server instruction API.
Attackers can exploit this vulnerability remotely over the network with no authentication or user interaction required, as indicated by its CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) and association with CWE-22. By crafting a malicious `run_hash` value in a request to the tracking server's instruction API, an unauthenticated attacker can delete any arbitrary file on the machine hosting the server.
Mitigation details and additional technical analysis are available in the Huntr advisory at https://huntr.com/bounties/59d3472f-f581-4beb-a090-afd36a00ecf7.
Details
- CWE(s)