CVE-2023-30172: mflow vulnerable to directory traversal
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.
References
- github.com/advisories/GHSA-wc6j-5g83-xfm6
- github.com/mlflow/mlflow/commit/ac4b697bb0bb8a331944dca63f4235b4bf602ab8
- github.com/mlflow/mlflow/commits/v2.0.0?after=00c3b0a350a28c25b16fbb7feddb8147a919ce18+69&branch=v2.0.0&qualified_name=refs%2Ftags%2Fv2.0.0
- github.com/mlflow/mlflow/issues/7166
- github.com/mlflow/mlflow/issues/7166
- github.com/mlflow/mlflow/pull/7170
- nvd.nist.gov/vuln/detail/CVE-2023-30172
Detect and mitigate CVE-2023-30172 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →