CVE-2024-2928

A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07 - Patch () https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07 - Patch
References () https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298 - Exploit, Issue Tracking, Patch, Third Party Advisory

11 Oct 2024, 15:28

Type Values Removed Values Added
CWE CWE-22
First Time Lfprojects
Lfprojects mlflow
CPE cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
References () https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07 - () https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07 - Patch
References () https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298 - () https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298 - Exploit, Issue Tracking, Patch, Third Party Advisory

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) Se identificó una vulnerabilidad de inclusión de archivos locales (LFI) en mlflow/mlflow, específicamente en la versión 2.9.2, que se solucionó en la versión 2.11.3. Esta vulnerabilidad surge de la falla de la aplicación al validar adecuadamente los fragmentos de URI para secuencias de directory traversal como '../'. Un atacante puede aprovechar esta falla manipulando la parte del fragmento del URI para leer archivos arbitrarios en el sistema de archivos local, incluidos archivos confidenciales como '/etc/passwd'. La vulnerabilidad es una omisión de un parche anterior que solo abordaba una manipulación similar dentro de la cadena de consulta del URI, destacando la necesidad de una validación integral de todas las partes de un URI para prevenir ataques LFI.

06 Jun 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 19:15

Updated : 2024-11-21 09:10


NVD link : CVE-2024-2928

Mitre link : CVE-2024-2928

CVE.ORG link : CVE-2024-2928


JSON object : View

Products Affected

lfprojects

  • mlflow
CWE
CWE-29

Path Traversal: '\..\filename'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')