aim@3.26.0.dev20241024 vulnerabilities

A super-easy way to record, search and compare AI experiments.

Direct Vulnerabilities

Known vulnerabilities in the aim package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

aim is a super-easy way to record, search and compare AI experiments.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to its us of dangerouslySetInnerHTML in the textbox component of the web UI. An attacker can inject scripts which will be executed when a user accesses the text explorer feature.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for aim.

[0,)
  • M
Cross-site Scripting (XSS)

aim is a super-easy way to record, search and compare AI experiments.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the dangerouslySetInnerHTML function. An attacker can exploit this vulnerability by injecting malicious scripts into the logs, which will be executed when a user views the logs-tab.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for aim.

[0,)
  • C
Arbitrary File Write via Archive Extraction

aim is a super-easy way to record, search and compare AI experiments.

Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction through the manipulation of file paths. An attacker could remotely overwrite any file on the host server and to exfiltrate any data from the host server. This can be abused to cause denial of service by overwriting critical system files, loss of private data, and remote code execution by downloading private ssh-keys.

Note:

Having full control over these zip files leads to two vulnerabilities:

The first is being able to overwrite any existing file on the system(e.g. the contents of the file is not "useful" to the attacker, but it can nevertheless be used to cause denial of service by overwriting critical system files).

The second vulnerability is achieved by using the built-in sshfs-client of the project to mount an external directory, and write the zip file to that. This is an intended feature of the project, being a way of getting files off of the vulnerable system.

How to fix Arbitrary File Write via Archive Extraction?

There is no fixed version for aim.

[0,)
  • H
Resource Exhaustion

aim is a super-easy way to record, search and compare AI experiments.

Affected versions of this package are vulnerable to Resource Exhaustion due to the misconfiguration of the remote tracking server. This can lead to an endless loop of connections that prevents it from handling other legitimate requests.

How to fix Resource Exhaustion?

There is no fixed version for aim.

[0,)
  • C
Improper Control of Generation of Code ('Code Injection')

aim is a super-easy way to record, search and compare AI experiments.

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper restriction of user access to the RunView object. An attacker can execute arbitrary commands on the server, potentially leading to full system compromise by exploiting the query parameter in the /api/runs/search/run/ endpoint.

How to fix Improper Control of Generation of Code ('Code Injection')?

There is no fixed version for aim.

[3.0.0,)
  • H
Cross-Site Request Forgery (CSRF)

aim is a super-easy way to record, search and compare AI experiments.

Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) due to the lack of CSRF and CORS protection in the aim dashboard. An attacker can exploit this by tricking a user into executing a malicious script that sends unauthorized requests to the aim server, leading to potential data loss and unauthorized data manipulation.

How to fix Cross-Site Request Forgery (CSRF)?

There is no fixed version for aim.

[0,)