CVE-2024-1483 Scanner

CVE-2024-1483 Scanner - Path Traversal vulnerability in mlflow

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 week 19 hours

Scan only one

Domain, IPv4

Toolbox

-

mlflow is an open-source platform primarily used by data scientists and machine learning engineers to manage the entire machine learning lifecycle. It allows for experimentation, reproducibility, and deployment of machine learning models. As a platform, it provides tools for tracking experiments, managing models, and deploying them in different environments. mlflow is commonly used across industries to facilitate data-driven decisions by automating various aspects of machine learning pipelines. It supports multiple machine learning frameworks and integrates with tools like Apache Spark. The platform is widely adopted for its simplicity and flexibility in model management.

The vulnerability in question is a Path Traversal issue present in mlflow versions earlier than 2.9.2. This vulnerability allows attackers to manipulate file paths and access files outside of the intended directory. By submitting HTTP POST requests containing specially crafted parameters, an attacker can exploit this weakness. The vulnerability arises from inadequate input validation within the server’s handlers for certain file-related operations. Path traversal attacks can lead to severe information disclosure, including sensitive files stored on the server. The vulnerability is of high severity due to its potential to reveal critical system information.

In this case, the 'artifact_location' and 'source' parameters in HTTP POST requests are vulnerable to manipulation. Attackers can use these parameters to traverse the server’s directory structure, accessing files outside the intended directories. For example, by crafting a request with 'http:///#/../../../../../../../../../../../../../../etc/', an attacker can attempt to access sensitive files like system configurations or SSH keys. The lack of proper validation of user-supplied input in these parameters allows for the directory traversal attack. The vulnerability is associated with mlflow's handling of paths provided in requests for managing experiments, runs, and model versions. These requests are processed in various endpoints related to the creation and management of experiments, models, and runs in mlflow.

Exploiting this vulnerability could lead to the disclosure of sensitive files on the affected server. These files may include configuration files, SSH keys, or other sensitive system information. Attackers can leverage this information for further attacks, such as privilege escalation or access to secure internal resources. In some cases, attackers may be able to execute arbitrary code if they gain access to critical files. The attacker does not require authentication to exploit this vulnerability, making it particularly dangerous. Organizations running vulnerable versions of mlflow may face serious security risks if this issue is exploited.

REFERENCES

Get started to protecting your Free Full Security Scan