A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.
References
Link | Resource |
---|---|
https://github.com/mlflow/mlflow/issues/7166 | Issue Tracking |
https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234 | Issue Tracking |
https://github.com/mlflow/mlflow/issues/7166 | Issue Tracking |
https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234 | Issue Tracking |
Configurations
History
21 Nov 2024, 07:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mlflow/mlflow/issues/7166 - Issue Tracking | |
References | () https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234 - Issue Tracking |
Information
Published : 2023-05-11 02:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-30172
Mitre link : CVE-2023-30172
CVE.ORG link : CVE-2023-30172
JSON object : View
Products Affected
lfprojects
- mlflow
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')