CVE-2024-1594

A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the `artifact_location` parameter when creating an experiment. Attackers can exploit this vulnerability by using a fragment component `#` in the artifact location URI to read arbitrary files on the server in the context of the server's process. This issue is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect.
Configurations

No configuration.

History

21 Nov 2024, 08:50

Type Values Removed Values Added
References () https://huntr.com/bounties/424b6f6b-e778-4a2b-b860-39730d396f3e - () https://huntr.com/bounties/424b6f6b-e778-4a2b-b860-39730d396f3e -

16 Apr 2024, 13:24

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de path traversal en el repositorio mlflow/mlflow, específicamente en el manejo del parámetro `artifact_location` al crear un experimento. Los atacantes pueden aprovechar esta vulnerabilidad utilizando un componente de fragmento `#` en el URI de ubicación del artefacto para leer archivos arbitrarios en el servidor en el contexto del proceso del servidor. Este problema es similar a CVE-2023-6909 pero utiliza un componente diferente del URI para lograr el mismo efecto.

16 Apr 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 00:15

Updated : 2024-11-21 08:50


NVD link : CVE-2024-1594

Mitre link : CVE-2024-1594

CVE.ORG link : CVE-2024-1594


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')