Lucene search

K
vulnrichment@huntr_aiVULNRICHMENT:CVE-2024-0520
HistoryJun 06, 2024 - 6:19 p.m.

CVE-2024-0520 Remote Code Execution due to Full Controlled File Write in mlflow/mlflow

2024-06-0618:19:36
CWE-23
@huntr_ai
github.com
6
vulnerability
remote code execution
mlflow
command injection
http dataset source
path traversal
arbitrary file write
data security
version 2.9.0 fix

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8

Confidence

Low

EPSS

0

Percentile

9.0%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command (‘Command Injection’) within the mlflow.data.http_dataset_source.py module. Specifically, when loading a dataset from a source URL with an HTTP scheme, the filename extracted from the Content-Disposition header or the URL path is used to generate the final file path without proper sanitization. This flaw enables an attacker to control the file path fully by utilizing path traversal or absolute path techniques, such as ‘…/…/tmp/poc.txt’ or ‘/tmp/poc.txt’, leading to arbitrary file write. Exploiting this vulnerability could allow a malicious user to execute commands on the vulnerable machine, potentially gaining access to data and model information. The issue is fixed in version 2.9.0.

CNA Affected

[
  {
    "vendor": "mlflow",
    "product": "mlflow/mlflow",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified",
        "lessThan": "2.9.0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8

Confidence

Low

EPSS

0

Percentile

9.0%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-0520