CVE-2024-1483
CVSS V2 None
CVSS V3 None
Description
A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.
Overview
- CVE ID
- CVE-2024-1483
- Assigner
- @huntr_ai
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-16T00:00:14.064Z
- Last Modified Date
- 2024-04-16T11:10:53.707Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://huntr.com/bounties/52a3855d-93ff-4460-ac24-9c7e4334198d |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-1483 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1483 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 06:40:16 | Added to TrackCVE |