First published: Tue Apr 16 2024(Updated: )
A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <=2.9.2 | 2.12.1 |
MLflow | <2.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1483 has a medium severity rating due to its potential to expose sensitive files on the server.
To fix CVE-2024-1483, upgrade the mlflow package to version 2.12.1 or later using pip.
CVE-2024-1483 affects systems running mlflow version 2.9.2 and earlier.
The impact of CVE-2024-1483 includes the ability for attackers to perform path traversal and access arbitrary files on the server.
CVE-2024-1483 is classified as medium severity, indicating it is not critical but still poses a significant risk.