Lucene search

K
githubGitHub Advisory DatabaseGHSA-5Q6C-FFVG-XCM9
HistoryJun 06, 2024 - 9:30 p.m.

Remote code execution in mlflow

2024-06-0621:30:35
CWE-23
GitHub Advisory Database
github.com
8
mlflow
vulnerability
remote code execution
command injection
http dataset
file path
sanitization
path traversal
arbitrary file write
data access
model information
fixed version 2.9.0

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command (‘Command Injection’) within the mlflow.data.http_dataset_source.py module. Specifically, when loading a dataset from a source URL with an HTTP scheme, the filename extracted from the Content-Disposition header or the URL path is used to generate the final file path without proper sanitization. This flaw enables an attacker to control the file path fully by utilizing path traversal or absolute path techniques, such as ‘…/…/tmp/poc.txt’ or ‘/tmp/poc.txt’, leading to arbitrary file write. Exploiting this vulnerability could allow a malicious user to execute commands on the vulnerable machine, potentially gaining access to data and model information. The issue is fixed in version 2.9.0.

Affected configurations

Vulners
Node
lfprojectsmlflowRange<2.9.0
CPENameOperatorVersion
mlflowlt2.9.0

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-5Q6C-FFVG-XCM9