A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This allows an attacker to construct a URL that, when processed, ignores the protocol scheme and uses the provided path for filesystem access. As a result, an attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by exploiting the way the application converts the URL into a filesystem path. The issue stems from insufficient validation of the fragment portion of the URL, leading to arbitrary file read through path traversal.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rfqq-wq6w-72jm MLflow has a Local File Read/Path Traversal bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 24 Jan 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Lfprojects
Lfprojects mlflow
Weaknesses CWE-22
CPEs cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
Vendors & Products Lfprojects
Lfprojects mlflow
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T20:26:57.075Z

Reserved: 2024-04-15T17:50:00.311Z

Link: CVE-2024-3848

cve-icon Vulnrichment

Updated: 2024-08-01T20:26:57.075Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-16T09:15:14.543

Modified: 2025-01-24T17:28:21.717

Link: CVE-2024-3848

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.