Description
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0160 | A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter. |
Github GHSA |
GHSA-wc6j-5g83-xfm6 | mflow vulnerable to directory traversal |
References
History
Mon, 27 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-27T16:51:28.457Z
Reserved: 2023-04-07T00:00:00.000Z
Link: CVE-2023-30172
Updated: 2024-08-02T14:21:44.496Z
Status : Modified
Published: 2023-05-11T02:15:08.880
Modified: 2025-01-27T17:15:12.883
Link: CVE-2023-30172
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA