AVID-2026-R1614
Description
Unrestricted Code Execution in aimhubio/aim (CVE-2024-8238)
Details
In version 3.22.0 of aimhubio/aim, the AimQL query language uses an outdated version of the safer_getattr() function from RestrictedPython. This version does not protect against the str.format_map() method, allowing an attacker to leak server-side secrets or potentially gain unrestricted code execution. The vulnerability arises because str.format_map() can read arbitrary attributes of Python objects, enabling attackers to access sensitive variables such as os.environ. If an attacker can write files to a known location on the Aim server, they can use str.format_map() to load a malicious .dll/.so file into the Python interpreter, leading to unrestricted code execution.
Reason for inclusion in AVID: CVE-2024-8238 describes an RCE vulnerability in the aimhubio/aim platform due to unsafe handling in a Python template mechanism (format_map via safer_getattr), allowing leakage of secrets and potential unrestricted code execution. This is a software-level flaw in a component used to build/deploy AI workflows (AimQL/aim platform), not hardware. The vulnerability can impact AI deployment pipelines and therefore constitutes a software supply chain issue within general-purpose AI systems. The report provides explicit security impact signals (RCE, secret leakage) and references, supporting inclusion in AVID curation.
References
Affected or Relevant Artifacts
- Developer: aimhubio
- Deployer: aimhubio
- Artifact Details:
| Type | Name |
|---|---|
| System | aimhubio/aim |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Base Score | 5.9 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | NONE |
| Availability Impact | NONE |
CWE
| ID | Description |
|---|---|
| CWE-1336 | CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-03-20
- Version: 0.3.3
- AVID Entry