First published: Tue Apr 16 2024(Updated: )
A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the `artifact_location` parameter when creating an experiment. Attackers can exploit this vulnerability by using a fragment component `#` in the artifact location URI to read arbitrary files on the server in the context of the server's process. This issue is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <=2.9.2 | |
MLflow | <2.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1594 has been assigned a medium severity rating due to its potential to allow unauthorized file access.
To fix CVE-2024-1594, upgrade to mlflow version 2.11.3 or later.
CVE-2024-1594 affects users of the mlflow package with versions up to and including 2.9.2.
CVE-2024-1594 is caused by a path traversal vulnerability in the handling of the `artifact_location` parameter.
Yes, attackers can exploit CVE-2024-1594 by crafting a malicious URI with a fragment component to read arbitrary files.