CVE-2024-3573 Vulnerability Details

  /     /     /  

CVE-2024-3573 Metadata Quick Info

CVE Published: 16/04/2024 | CVE Updated: 01/08/2024 | CVE Year: 2024
Source: @huntr_ai | Vendor: mlflow | Product: mlflow/mlflow
Status : PUBLISHED

CVE-2024-3573 Description

mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the \'is_local_uri\' function\'s failure to properly handle URIs with empty or \'file\' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted \'source\' parameters, enabling the reading of sensitive files within at least two directory levels from the server\'s root.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-29
CWE Name: CWE-29 Path Traversal: ..filename
Source: mlflow

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).