Lucene search

K
githubGitHub Advisory DatabaseGHSA-M49C-5C52-6696
HistoryApr 16, 2024 - 12:30 a.m.

mlflow vulnerable to Path Traversal

2024-04-1600:30:33
CWE-22
GitHub Advisory Database
github.com
10
mlflow
repository
path traversal
vulnerability
artifact location
experiment
cve-2023-6909

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.005 Low

EPSS

Percentile

76.3%

A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the artifact_location parameter when creating an experiment. Attackers can exploit this vulnerability by using a fragment component # in the artifact location URI to read arbitrary files on the server in the context of the server’s process. This issue is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect.

Affected configurations

Vulners
Node
github_advisory_databasemlflowRange2.9.2
CPENameOperatorVersion
mlflowle2.9.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.005 Low

EPSS

Percentile

76.3%