{ "schema_version": "1.4.0", "id": "GHSA-p6x3-v6g3-7557", "modified": "2025-03-21T18:55:58Z", "published": "2025-03-20T12:32:44Z", "aliases": [ "CVE-2024-6483" ], "summary": "Aim Relative Path Traversal vulnerability", "details": "A vulnerability in the `runs/delete-batch` endpoint of aimhubio/aim version 3.19.3 allows for arbitrary file or directory deletion through path traversal. The endpoint does not mitigate path traversal when handling user-specified run-names, which are used to specify log/metadata files for deletion. This can be exploited to delete arbitrary files or directories, potentially causing denial of service or data loss.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "affected": [ { "package": { "ecosystem": "PyPI", "name": "aim" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "3.19.3" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6483" }, { "type": "PACKAGE", "url": "https://github.com/aimhubio/aim" }, { "type": "WEB", "url": "https://huntr.com/bounties/dc45d480-e579-4af4-8603-c52ecfd5e363" } ], "database_specific": { "cwe_ids": [ "CWE-23" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-03-21T18:55:58Z", "nvd_published_at": "2025-03-20T10:15:32Z" } }