CVE-2024-1593 Vulnerability Details

  /     /     /  

CVE-2024-1593 Metadata Quick Info

CVE Published: 16/04/2024 | CVE Updated: 01/08/2024 | CVE Year: 2024
Source: @huntr_ai | Vendor: mlflow | Product: mlflow/mlflow
Status : PUBLISHED

CVE-2024-1593 Description

A path traversal vulnerability exists in the mlflow/mlflow repository due to improper handling of URL parameters. By smuggling path traversal sequences using the \';\' character in URLs, attackers can manipulate the \'params\' portion of the URL to gain unauthorized access to files or directories. This vulnerability allows for arbitrary data smuggling into the \'params\' part of the URL, enabling attacks similar to those described in previous reports but utilizing the \';\' character for parameter smuggling. Successful exploitation could lead to unauthorized information disclosure or server compromise.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-22
CWE Name: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ( Path Traversal )
Source: mlflow

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).