Логотип exploitDog
bind:CVE-2024-1483
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-1483

Количество 2

Количество 2

nvd логотип

CVE-2024-1483

почти 2 года назад

A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.

CVSS3: 7.5
EPSS: Высокий
github логотип

GHSA-f82r-jj5r-6g97

почти 2 года назад

mlflow Path Traversal vulnerability

CVSS3: 7.5
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-1483

A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.

CVSS3: 7.5
79%
Высокий
почти 2 года назад
github логотип
GHSA-f82r-jj5r-6g97

mlflow Path Traversal vulnerability

CVSS3: 7.5
79%
Высокий
почти 2 года назад

Уязвимостей на страницу