A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.
{ "vanir_signatures": [ { "digest": { "threshold": 0.9, "line_hashes": [ "331374387258698623515503197375262902471", "56531494967603305558894176301696978897", "156845208350900572074037141806451871031", "236113965666297154310270274411699188635" ] }, "id": "CVE-2024-1483-0490fec7", "source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501", "signature_type": "Line", "signature_version": "v1", "target": { "file": "mlflow/java/scoring/src/main/java/org/mlflow/sagemaker/ScoringServer.java" }, "deprecated": false }, { "digest": { "function_hash": "103832320670295227953645632588587077659", "length": 189.0 }, "id": "CVE-2024-1483-54219b73", "source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501", "signature_type": "Function", "signature_version": "v1", "target": { "file": "mlflow/java/scoring/src/main/java/org/mlflow/sagemaker/ScoringServer.java", "function": "doGet" }, "deprecated": false }, { "digest": { "function_hash": "248178710733966095301624193790593745960", "length": 483.0 }, "id": "CVE-2024-1483-9f1fee19", "source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501", "signature_type": "Function", "signature_version": "v1", "target": { "file": "mlflow/java/scoring/src/test/java/org/mlflow/ScoringServerTest.java", "function": "testScoringServerWithValidPredictorRespondsToVersionCorrectly" }, "deprecated": false }, { "digest": { "threshold": 0.9, "line_hashes": [ "227586388277291964245723347465144503129", "214612006548484888068671228559130409821", "141702509437346544668394886097631250819", "44304877576058785675745254216915397335" ] }, "id": "CVE-2024-1483-d79dc76d", "source": "https://github.com/mlflow/mlflow/commit/328242e01b766129396415be219cb96127097501", "signature_type": "Line", "signature_version": "v1", "target": { "file": "mlflow/java/scoring/src/test/java/org/mlflow/ScoringServerTest.java" }, "deprecated": false } ] }