vertaai/modeldb is vulnerable to a path traversal attack due to improper sanitization of user-supplied file paths in its file upload functionality. Attackers can exploit this vulnerability to write arbitrary files anywhere in the file system by manipulating the 'artifact_path' parameter. This flaw can lead to Remote Code Execution (RCE) by overwriting critical files, such as the application's configuration file, especially when the application is run outside of Docker. The vulnerability is present in the NFSController.java and NFSService.java components of the application.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-16T00:00:15.706Z
Updated: 2024-08-29T19:26:57.248Z
Reserved: 2024-02-27T21:30:47.630Z
Link: CVE-2024-1961
Vulnrichment
Updated: 2024-08-01T18:56:22.583Z
NVD
Status : Awaiting Analysis
Published: 2024-04-16T00:15:10.867
Modified: 2024-04-16T13:24:07.103
Link: CVE-2024-1961
Redhat
No data.