Lucene search

K
nvd[email protected]NVD:CVE-2024-3573
HistoryApr 16, 2024 - 12:15 a.m.

CVE-2024-3573

2024-04-1600:15:12
CWE-29
web.nvd.nist.gov
cve-2024-3573
mlflow
local file inclusion
improper parsing
uri
bypass checks
arbitrary files
system
'is_local_uri'
misclassification
attackers
malicious model versions
sensitive files
directory levels

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

9.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the ‘is_local_uri’ function’s failure to properly handle URIs with empty or ‘file’ schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted ‘source’ parameters, enabling the reading of sensitive files within at least two directory levels from the server’s root.

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

9.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%