mlflow vulnerable to Path Traversal
High severity
GitHub Reviewed
Published
Apr 16, 2024
to the GitHub Advisory Database
•
Updated Aug 9, 2024
Description
Published by the National Vulnerability Database
Apr 16, 2024
Published to the GitHub Advisory Database
Apr 16, 2024
Reviewed
Apr 16, 2024
Last updated
Aug 9, 2024
A path traversal vulnerability exists in the
_create_model_version()
function withinserver/handlers.py
of the mlflow/mlflow repository, due to improper validation of thesource
parameter. Attackers can exploit this vulnerability by crafting asource
parameter that bypasses the_validate_non_local_source_contains_relative_paths(source)
function's checks, allowing for arbitrary file read access on the server. The issue arises from the handling of unquoted URL characters and the subsequent misuse of the originalsource
value for model version creation, leading to the exposure of sensitive files when interacting with the/model-versions/get-artifact
handler.References