Path Traversal in restore_run_backup() in AIM 3.28.0...
High severity
Unreviewed
Published
Jul 22, 2025
to the GitHub Advisory Database
•
Updated Jul 22, 2025
Description
Published by the National Vulnerability Database
Jul 22, 2025
Published to the GitHub Advisory Database
Jul 22, 2025
Last updated
Jul 22, 2025
Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.
References