vertaai/modeldb is vulnerable to a path traversal attack due to improper sanitization of user-supplied file paths in its file upload functionality. Attackers can exploit this vulnerability to write arbitrary files anywhere in the file system by manipulating the 'artifact_path' parameter. This flaw can lead to Remote Code Execution (RCE) by overwriting critical files, such as the application's configuration file, especially when the application is run outside of Docker. The vulnerability is present in the NFSController.java and NFSService.java components of the application.
References
Configurations
No configuration.
History
21 Nov 2024, 08:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/5f602914-3e5d-407a-b8ce-fb444a4e8bb3 - |
16 Apr 2024, 13:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Apr 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-16 00:15
Updated : 2024-11-21 08:51
NVD link : CVE-2024-1961
Mitre link : CVE-2024-1961
CVE.ORG link : CVE-2024-1961
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')