mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lfprojects
Lfprojects mlflow |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* | |
Vendors & Products |
Lfprojects
Lfprojects mlflow |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:12:07.901Z
Reserved: 2024-04-10T09:54:30.434Z
Link: CVE-2024-3573

Updated: 2024-08-01T20:12:07.901Z

Status : Analyzed
Published: 2024-04-16T00:15:12.570
Modified: 2025-02-03T15:50:28.267
Link: CVE-2024-3573

No data.