First published: Tue Apr 16 2024(Updated: )
A path traversal vulnerability exists in the mlflow/mlflow repository due to improper handling of URL parameters. By smuggling path traversal sequences using the ';' character in URLs, attackers can manipulate the 'params' portion of the URL to gain unauthorized access to files or directories. This vulnerability allows for arbitrary data smuggling into the 'params' part of the URL, enabling attacks similar to those described in previous reports but utilizing the ';' character for parameter smuggling. Successful exploitation could lead to unauthorized information disclosure or server compromise.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <=2.9.2 | |
MLflow | <2.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1593 is classified as a high severity path traversal vulnerability.
To mitigate CVE-2024-1593, upgrade the mlflow package to version 2.11.3 or later.
CVE-2024-1593 affects mlflow versions up to and including 2.9.2.
CVE-2024-1593 allows attackers to access unauthorized files by manipulating URL parameters.
CVE-2024-1593 is a standalone vulnerability and does not have known related vulnerabilities.