Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46476
HistoryApr 17, 2024 - 7:35 a.m.

Path Traversal

2024-04-1707:35:29
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9
mlflow
path traversal
vulnerability
arbitrary files

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7

Confidence

High

EPSS

0

Percentile

10.5%

MLflow is vulnerable to a path traversal attack. The vulnerability is due to improper handling of the artifact_location parameter when creating an experiment, allowing attackers to exploit the fragment component # of the URI to read arbitrary files on the server in the context of the server’s process.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7

Confidence

High

EPSS

0

Percentile

10.5%