
CVE-2024-8863 – aimhubio aim Text Explorer textbox.tsx dangerouslySetInnerHTML cross site scripting
https://notcve.org/view.php?id=CVE-2024-8863
14 Sep 2024 — A vulnerability, which was classified as problematic, was found in aimhubio aim up to 3.24. Affected is the function dangerouslySetInnerHTML of the file textbox.tsx of the component Text Explorer. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://rumbling-slice-eb0.notion.site/Stored-XSS-through-TEXT-EXPLORER-in-aimhubio-aim-d0f07b7194724950a673498546d80d43?pvs=4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-6578 – Stored XSS in aimhubio/aim
https://notcve.org/view.php?id=CVE-2024-6578
29 Jul 2024 — A stored cross-site scripting (XSS) vulnerability exists in aimhubio/aim version 3.19.3. The vulnerability arises from the improper neutralization of input during web page generation, specifically in the logs-tab for runs. The terminal output logs are displayed using the `dangerouslySetInnerHTML` function in React, which is susceptible to XSS attacks. An attacker can exploit this vulnerability by injecting malicious scripts into the logs, which will be executed when a user views the logs-tab. • https://huntr.com/bounties/5b1ebc67-5346-44aa-b8b8-3c1c09d79680 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-6396 – Arbitrary File Overwrite and Data Exfiltration in aimhubio/aim
https://notcve.org/view.php?id=CVE-2024-6396
12 Jul 2024 — A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution. Una vulnerabilidad en la función `_backup... • https://huntr.com/bounties/c1b17afd-4656-47bb-8310-686a9e1b04a0 • CWE-29: Path Traversal: '\..\filename' •

CVE-2024-6227 – Infinite Loop in aimhubio/aim
https://notcve.org/view.php?id=CVE-2024-6227
08 Jul 2024 — A vulnerability in aimhubio/aim version 3.19.3 allows an attacker to cause a denial of service by configuring the remote tracking server to point at itself. This results in the server endlessly connecting to itself, rendering it unable to respond to other connections. Una vulnerabilidad en aimhubio/aim versión 3.19.3 permite a un atacante provocar una denegación de servicio configurando el servidor de seguimiento remoto para que apunte a sí mismo. Esto da como resultado que el servidor se conecte interminab... • https://huntr.com/bounties/abcea7c6-bb3b-45e9-aa15-9eb6b224451a • CWE-400: Uncontrolled Resource Consumption CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2024-2195 – Remote Code Execution in aimhubio/aim
https://notcve.org/view.php?id=CVE-2024-2195
10 Apr 2024 — A critical Remote Code Execution (RCE) vulnerability was identified in the aimhubio/aim project, specifically within the `/api/runs/search/run/` endpoint, affecting versions >= 3.0.0. The vulnerability resides in the `run_search_api` function of the `aim/web/api/runs/views.py` file, where improper restriction of user access to the `RunView` object allows for the execution of arbitrary code via the `query` parameter. This issue enables attackers to execute arbitrary commands on the server, potentially leadin... • https://huntr.com/bounties/22f2355e-b875-4c01-b454-327e5951c018 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-2196 – CSRF Vulnerability in aimhubio/aim
https://notcve.org/view.php?id=CVE-2024-2196
10 Apr 2024 — aimhubio/aim is vulnerable to Cross-Site Request Forgery (CSRF), allowing attackers to perform actions such as deleting runs, updating data, and stealing data like log records and notes without the user's consent. The vulnerability stems from the lack of CSRF and CORS protection in the aim dashboard. An attacker can exploit this by tricking a user into executing a malicious script that sends unauthorized requests to the aim server, leading to potential data loss and unauthorized data manipulation. • https://huntr.com/bounties/e141e3f2-afbb-405f-a891-f66628c8b68f • CWE-352: Cross-Site Request Forgery (CSRF) •