Описание
mflow vulnerable to directory traversal
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform prior to v2.0.0 allows attackers to read arbitrary files on the server via the path parameter.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-30172
- https://github.com/mlflow/mlflow/issues/7166
- https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234
- https://github.com/mlflow/mlflow/pull/7170
- https://github.com/mlflow/mlflow/commit/ac4b697bb0bb8a331944dca63f4235b4bf602ab8
- https://github.com/mlflow/mlflow/commits/v2.0.0?after=00c3b0a350a28c25b16fbb7feddb8147a919ce18+69&branch=v2.0.0&qualified_name=refs%2Ftags%2Fv2.0.0
- https://github.com/pypa/advisory-database/tree/main/vulns/mlflow/PYSEC-2023-70.yaml
Пакеты
Наименование
mlflow
pip
Затронутые версииВерсия исправления
< 2.0.0rc0
2.0.0rc0
Связанные уязвимости
CVSS3: 7.5
nvd
больше 2 лет назад
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.