Lucene search

K
githubGitHub Advisory DatabaseGHSA-F82R-JJ5R-6G97
HistoryApr 16, 2024 - 12:30 a.m.

mlflow Path Traversal vulnerability

2024-04-1600:30:32
CWE-22
GitHub Advisory Database
github.com
8
mlflow
path traversal
vulnerability
http post
validation
server security

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted ‘artifact_location’ and ‘source’ parameters, using a local URI with ‘#’ instead of ‘?’, an attacker can traverse the server’s directory structure. The issue occurs due to insufficient validation of user-supplied input in the server’s handlers.

Affected configurations

Vulners
Node
lfprojectsmlflowRange2.9.2
CPENameOperatorVersion
mlflowle2.9.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Related for GHSA-F82R-JJ5R-6G97