CVE-2024-4263
- EPSS 0.06%
- Published 16.05.2024 09:15:16
- Last modified 03.02.2025 15:55:20
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, where low privilege users with only EDIT permissions on an experiment can delete any artifacts. This issue arises due to the lack of proper validation for DELETE re...
CVE-2024-3848
- EPSS 73.81%
- Published 16.05.2024 09:15:14
- Last modified 24.01.2025 17:28:21
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to ...
CVE-2024-3573
- EPSS 0.26%
- Published 16.04.2024 00:15:12
- Last modified 03.02.2025 15:50:28
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs...
CVE-2024-1594
- EPSS 0.36%
- Published 16.04.2024 00:15:09
- Last modified 03.02.2025 15:41:00
A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the `artifact_location` parameter when creating an experiment. Attackers can exploit this vulnerability by using a fragment component `#` in th...
CVE-2024-1593
- EPSS 0.56%
- Published 16.04.2024 00:15:09
- Last modified 03.02.2025 15:41:20
A path traversal vulnerability exists in the mlflow/mlflow repository due to improper handling of URL parameters. By smuggling path traversal sequences using the ';' character in URLs, attackers can manipulate the 'params' portion of the URL to gain ...
CVE-2024-1560
- EPSS 0.14%
- Published 16.04.2024 00:15:08
- Last modified 03.02.2025 15:18:54
A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the artifact deletion functionality. Attackers can bypass path validation by exploiting the double decoding process in the `_delete_artifact_mlflow_artifacts` ...
CVE-2024-1558
- EPSS 0.16%
- Published 16.04.2024 00:15:08
- Last modified 03.02.2025 15:14:41
A path traversal vulnerability exists in the `_create_model_version()` function within `server/handlers.py` of the mlflow/mlflow repository, due to improper validation of the `source` parameter. Attackers can exploit this vulnerability by crafting a ...
CVE-2024-1483
- EPSS 78.61%
- Published 16.04.2024 00:15:08
- Last modified 03.02.2025 15:02:46
A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a l...
CVE-2024-27133
- EPSS 0.2%
- Published 23.02.2024 22:15:55
- Last modified 22.01.2025 13:46:56
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset t...
CVE-2024-27132
- EPSS 0.26%
- Published 23.02.2024 22:15:55
- Last modified 22.01.2025 14:15:26
Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This issue leads to a client-side RCE when running an untrusted recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over template variables...