In version 3.25.0 of aimhubio/aim, a denial of service vulnerability exists. By tracking a large number of Text
objects and then querying them simultaneously through the web API, the Aim web server becomes unresponsive to other requests for an extended period while processing and returning these objects. This vulnerability can be exploited repeatedly, leading to a complete denial of service.
The product performs a data query with a large number of joins and sub-queries on a large data table.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Aim | Aimstack | 3.25.0 (including) | 3.25.0 (including) |
This issue can make the product perform more slowly. If the relevant code is reachable by an attacker, then this performance problem might introduce a vulnerability. While the interpretation of “large data table” and “large number of joins or sub-queries” may vary for each product or developer, CISQ recommends a default of 1 million rows for a “large” data table, a default minimum of 5 joins, and a default minimum of 3 sub-queries.