{"uuid": "377bead9-fee9-4c3e-8aaa-5a35a1782887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2195", "type": "seen", "source": "https://t.me/arpsyndicate/4590", "content": "#ExploitObserverAlert\n\nCVE-2024-2195\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-2195. A critical Remote Code Execution (RCE) vulnerability was identified in the aimhubio/aim project, specifically within the `/api/runs/search/run/` endpoint, affecting versions &gt;= 3.0.0. The vulnerability resides in the `run_search_api` function of the `aim/web/api/runs/views.py` file, where improper restriction of user access to the `RunView` object allows for the execution of arbitrary code via the `query` parameter. This issue enables attackers to execute arbitrary commands on the server, potentially leading to full system compromise.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.5780347", "creation_timestamp": "2024-04-12T10:28:06.000000Z"}