First published: Thu May 11 2023(Updated: )
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lfprojects Mlflow | <2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30172 is a directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1.
CVE-2023-30172 allows attackers to read arbitrary files on the server via the path parameter in the /get-artifact API method.
The severity of CVE-2023-30172 is high, with a severity value of 7.5.
To fix CVE-2023-30172, update the mlflow platform to version 2.0.2 or later.
You can find more information about CVE-2023-30172 on the mlflow GitHub page: [link](https://github.com/mlflow/mlflow/issues/7166)