logo

CVE-2024-3573 mlflow

Package

Manager: pip
Name: mlflow
Vulnerable Version: >=0 <2.10.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00191 pctl0.41273

Details

mlflow vulnerable to Path Traversal mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.

Metadata

Created: 2024-04-16T00:30:34Z
Modified: 2025-04-08T21:59:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-hq88-wg7q-gp4g/GHSA-hq88-wg7q-gp4g.json
CWE IDs: ["CWE-29"]
Alternative ID: GHSA-hq88-wg7q-gp4g
Finding: F184
Auto approve: 1