Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1239 | A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the `artifact_location` parameter when creating an experiment. Attackers can exploit this vulnerability by using a fragment component `#` in the artifact location URI to read arbitrary files on the server in the context of the server's process. This issue is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect. |
Github GHSA |
GHSA-m49c-5c52-6696 | mlflow vulnerable to Path Traversal |
Mon, 03 Feb 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lfprojects
Lfprojects mlflow |
|
| CPEs | cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lfprojects
Lfprojects mlflow |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T18:48:20.634Z
Reserved: 2024-02-16T21:42:41.714Z
Link: CVE-2024-1594
Updated: 2024-08-01T18:48:20.634Z
Status : Analyzed
Published: 2024-04-16T00:15:09.417
Modified: 2025-02-03T15:41:00.377
Link: CVE-2024-1594
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA