Lucene search

K
cve[email protected]CVE-2024-1593
HistoryApr 16, 2024 - 12:15 a.m.

CVE-2024-1593

2024-04-1600:15:09
CWE-22
web.nvd.nist.gov
32
cve-2024-1593
mlflow
path traversal
url parameter
unauthorized access
arbitrary data smuggling
information disclosure
server compromise
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

A path traversal vulnerability exists in the mlflow/mlflow repository due to improper handling of URL parameters. By smuggling path traversal sequences using the ‘;’ character in URLs, attackers can manipulate the ‘params’ portion of the URL to gain unauthorized access to files or directories. This vulnerability allows for arbitrary data smuggling into the ‘params’ part of the URL, enabling attacks similar to those described in previous reports but utilizing the ‘;’ character for parameter smuggling. Successful exploitation could lead to unauthorized information disclosure or server compromise.

CNA Affected

[
  {
    "vendor": "mlflow",
    "product": "mlflow/mlflow",
    "versions": [
      {
        "version": "unspecified",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "latest"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Related for CVE-2024-1593