إرسال #580253: aim 3.29.1 Sandbox Issueالمعلومات

عنوانaim 3.29.1 Sandbox Issue
الوصفAim is an open-source, lightweight, and performant experiment tracking tool for machine learning (ML) projects. It helps track, compare, and visualize AI model training runs and metadata. However, a critical vulnerability was identified that allows an attacker to escape the intended Python sandbox and achieve remote code execution (RCE). By leveraging the unsanitized run_view object passed into the sandbox environment as part of the local namespace, attackers can execute arbitrary system commands through the exposed web API.
المصدر⚠️ https://gist.github.com/superboy-zjc/1fc4747a0ac77a1edc8c32e1d4edc54c
المستخدم
 Gavin Zhong (UID 84092)
ارسال18/05/2025 06:11 PM (11 أشهر منذ)
الاعتدال29/05/2025 10:11 AM (11 days later)
الحالةتمت الموافقة
إدخال VulDB310492 [aimhubio aim حتى 3.29.1 run_view Object /aim/storage/query.py RestrictedPythonQuery استعلام تجاوز الصلاحيات]
النقاط20

Want to know what is going to be exploited?

We predict KEV entries!