A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.
[
{
"id": "CVE-2024-1483-0490fec7",
"deprecated": false,
"target": {
"file": "mlflow/java/scoring/src/main/java/org/mlflow/sagemaker/ScoringServer.java"
},
"source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501",
"digest": {
"line_hashes": [
"331374387258698623515503197375262902471",
"56531494967603305558894176301696978897",
"156845208350900572074037141806451871031",
"236113965666297154310270274411699188635"
],
"threshold": 0.9
},
"signature_version": "v1",
"signature_type": "Line"
},
{
"id": "CVE-2024-1483-54219b73",
"deprecated": false,
"target": {
"function": "doGet",
"file": "mlflow/java/scoring/src/main/java/org/mlflow/sagemaker/ScoringServer.java"
},
"source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501",
"digest": {
"length": 189.0,
"function_hash": "103832320670295227953645632588587077659"
},
"signature_version": "v1",
"signature_type": "Function"
},
{
"id": "CVE-2024-1483-9f1fee19",
"deprecated": false,
"target": {
"function": "testScoringServerWithValidPredictorRespondsToVersionCorrectly",
"file": "mlflow/java/scoring/src/test/java/org/mlflow/ScoringServerTest.java"
},
"source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501",
"digest": {
"length": 483.0,
"function_hash": "248178710733966095301624193790593745960"
},
"signature_version": "v1",
"signature_type": "Function"
},
{
"id": "CVE-2024-1483-d79dc76d",
"deprecated": false,
"target": {
"file": "mlflow/java/scoring/src/test/java/org/mlflow/ScoringServerTest.java"
},
"source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501",
"digest": {
"line_hashes": [
"227586388277291964245723347465144503129",
"214612006548484888068671228559130409821",
"141702509437346544668394886097631250819",
"44304877576058785675745254216915397335"
],
"threshold": 0.9
},
"signature_version": "v1",
"signature_type": "Line"
}
]