7.5
CVE-2024-8859
- EPSS 17.16%
- Published 20.03.2025 10:09:53
- Last modified 05.08.2025 16:15:20
- Source security@huntr.dev
- Teams watchlist Login
- Open Login
A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. When users configure and use the dbfs service, concatenating the URL directly into the file protocol results in an arbitrary file read vulnerability. This issue occurs because only the path part of the URL is checked, while parts such as query and parameters are not handled. The vulnerability is triggered if the user has configured the dbfs service, and during usage, the service is mounted to a local directory.
Data is provided by the National Vulnerability Database (NVD)
Lfprojects ≫ Mlflow Version2.15.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 17.16% | 0.948 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@huntr.dev | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-29 Path Traversal: '\..\filename'
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.