Vulnerability Description
A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the artifact deletion functionality. Attackers can bypass path validation by exploiting the double decoding process in the `_delete_artifact_mlflow_artifacts` handler and `local_file_uri_to_path` function, allowing for the deletion of arbitrary directories on the server's filesystem. This vulnerability is due to an extra unquote operation in the `delete_artifacts` function of `local_artifact_repo.py`, which fails to properly sanitize user-supplied paths. The issue is present up to version 2.9.2, despite attempts to fix a similar issue in CVE-2023-6831.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lfprojects | Mlflow | <= 2.9.2 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/4a34259c-3c8f-4872-b178-f27fbc876b98ExploitIssue TrackingThird Party Advisory
- https://huntr.com/bounties/4a34259c-3c8f-4872-b178-f27fbc876b98ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2024-1560?
CVE-2024-1560 is a vulnerability with a CVSS score of 8.1 (HIGH). A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the artifact deletion functionality. Attackers can bypass path validation by exploiting the double decoding p...
How severe is CVE-2024-1560?
CVE-2024-1560 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1560?
Check the references section above for vendor advisories and patch information. Affected products include: Lfprojects Mlflow.