Lucene search

K
githubGitHub Advisory DatabaseGHSA-J46Q-5PXX-8VMW
HistoryJun 06, 2024 - 9:30 p.m.

Local File Inclusion in mlflow

2024-06-0621:30:36
CWE-29
GitHub Advisory Database
github.com
4
local file inclusion
mlflow
version 2.9.2
version 2.11.3
directory traversal
uri fragments
application security
bypass
comprehensive validation

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

9.1%

A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application’s failure to properly validate URI fragments for directory traversal sequences such as ‘…/’. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like ‘/etc/passwd’. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI’s query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.

Affected configurations

Vulners
Node
lfprojectsmlflowRange<2.11.3
CPENameOperatorVersion
mlflowlt2.11.3

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-J46Q-5PXX-8VMW