Home » Database

AVID-2026-R1614

Description

Unrestricted Code Execution in aimhubio/aim (CVE-2024-8238)

Details

In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side secrets or potentially gain unrestricted code execution. The vulnerability arises because str.format_map() can read arbitrary attributes of Python objects, enabling attackers to access sensitive variables such as os.environ. If an attacker can write files to a known location on the Aim server, they can use str.format_map() to load a malicious .dll/.so file into the Python interpreter, leading to unrestricted code execution.

Reason for inclusion in AVID: CVE-2024-8238 describes an RCE vulnerability in the aimhubio/aim platform due to unsafe handling in a Python template mechanism (format_map via safer_getattr), allowing leakage of secrets and potential unrestricted code execution. This is a software-level flaw in a component used to build/deploy AI workflows (AimQL/aim platform), not hardware. The vulnerability can impact AI deployment pipelines and therefore constitutes a software supply chain issue within general-purpose AI systems. The report provides explicit security impact signals (RCE, secret leakage) and references, supporting inclusion in AVID curation.

References

Affected or Relevant Artifacts

  • Developer: aimhubio
  • Deployer: aimhubio
  • Artifact Details:
TypeName
Systemaimhubio/aim

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score5.9
Base Severity🟠 Medium
Attack VectorNETWORK
Attack Complexity🔴 High
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-1336CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry