Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1218 | mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root. |
Github GHSA |
GHSA-hq88-wg7q-gp4g | mlflow vulnerable to Path Traversal |
Mon, 03 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lfprojects
Lfprojects mlflow |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lfprojects
Lfprojects mlflow |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:12:07.901Z
Reserved: 2024-04-10T09:54:30.434Z
Link: CVE-2024-3573
Updated: 2024-08-01T20:12:07.901Z
Status : Analyzed
Published: 2024-04-16T00:15:12.570
Modified: 2025-02-03T15:50:28.267
Link: CVE-2024-3573
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA