Lucene search

K
githubGitHub Advisory DatabaseGHSA-5MVJ-WMGJ-7Q8C
HistoryApr 16, 2024 - 12:30 a.m.

mlflow vulnerable to Path Traversal

2024-04-1600:30:33
CWE-22
GitHub Advisory Database
github.com
7
mlflow
path traversal
vulnerability
artifact deletion
double decoding
local file uri
unquote operation
filesystem
version 2.9.2
cve-2023-6831
security issue

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.1%

A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the artifact deletion functionality. Attackers can bypass path validation by exploiting the double decoding process in the _delete_artifact_mlflow_artifacts handler and local_file_uri_to_path function, allowing for the deletion of arbitrary directories on the server’s filesystem. This vulnerability is due to an extra unquote operation in the delete_artifacts function of local_artifact_repo.py, which fails to properly sanitize user-supplied paths. The issue is present up to version 2.9.2, despite attempts to fix a similar issue in CVE-2023-6831.

Affected configurations

Vulners
Node
lfprojectsmlflowRange2.9.2
CPENameOperatorVersion
mlflowle2.9.2

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.1%