ghsa-hq88-wg7q-gp4g
Vulnerability from github
Published
2024-04-16 00:30
Modified
2024-04-16 18:20
Severity ?
Summary
mlflow vulnerable to Path Traversal
Details
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "mlflow" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.10.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-3573" ], "database_specific": { "cwe_ids": [ "CWE-29" ], "github_reviewed": true, "github_reviewed_at": "2024-04-16T18:20:36Z", "nvd_published_at": "2024-04-16T00:15:12Z", "severity": "CRITICAL" }, "details": "mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the \u0027is_local_uri\u0027 function\u0027s failure to properly handle URIs with empty or \u0027file\u0027 schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted \u0027source\u0027 parameters, enabling the reading of sensitive files within at least two directory levels from the server\u0027s root.", "id": "GHSA-hq88-wg7q-gp4g", "modified": "2024-04-16T18:20:36Z", "published": "2024-04-16T00:30:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3573" }, { "type": "WEB", "url": "https://github.com/mlflow/mlflow/commit/438a450714a3ca06285eeea34bdc6cf79d7f6cbc" }, { "type": "PACKAGE", "url": "https://github.com/mlflow/mlflow" }, { "type": "WEB", "url": "https://huntr.com/bounties/8ea058a7-4ef8-4baf-9198-bc0147fc543c" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", "type": "CVSS_V3" } ], "summary": "mlflow vulnerable to Path Traversal" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.