Plattform
python
Komponente
mlflow
Behoben in
2.12.1
CVE-2024-1483 describes a path traversal vulnerability discovered in MLflow versions up to 2.9.2. This flaw allows attackers to potentially access sensitive files on the server by manipulating HTTP POST requests. The vulnerability stems from insufficient input validation when handling 'artifact_location' and 'source' parameters. Affected users should upgrade to version 2.12.1 to mitigate this risk.
The path traversal vulnerability in MLflow allows an attacker to bypass intended access controls and read arbitrary files on the server hosting the MLflow tracking server. By crafting malicious HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the directory structure. This could lead to the exposure of sensitive data such as configuration files, credentials, or even application code. The potential blast radius extends to any data stored or processed by the MLflow server, depending on the server's permissions and configuration. While no direct precedent exists for this specific vulnerability, path traversal vulnerabilities are frequently exploited to gain unauthorized access to systems and data.
CVE-2024-1483 was publicly disclosed on April 16, 2024. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept (PoC) code is likely to emerge given the ease of exploitation associated with path traversal vulnerabilities. Monitor security advisories and threat intelligence feeds for updates on exploitation activity.
Organizations utilizing MLflow for machine learning model tracking and management, particularly those running versions 2.9.2 or earlier, are at risk. Shared hosting environments where multiple users share the same MLflow instance are especially vulnerable, as an attacker could potentially exploit the vulnerability to access data belonging to other users.
• python / mlflow:
import requests
url = 'http://your-mlflow-server/tracking/api/v2/artifacts'
headers = {'Content-Type': 'application/json'}
payload = {
'artifact_location': '../sensitive_file.txt#',
'source': 'local'
}
response = requests.post(url, headers=headers, json=payload)
print(response.status_code, response.text)• linux / server: journalctl filters for HTTP POST requests to /tracking/api/v2/artifacts with unusual parameters.
• generic web: Check access/error logs for HTTP POST requests to /tracking/api/v2/artifacts containing artifact_location or source parameters with '../' sequences.
disclosure
Exploit-Status
EPSS
77.15% (99% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-1483 is to upgrade MLflow to version 2.12.1 or later, which contains the necessary fix. If upgrading immediately is not feasible, consider implementing temporary workarounds. Restrict access to the MLflow tracking server to trusted networks and users. Implement strict input validation on the 'artifact_location' and 'source' parameters to prevent malicious path manipulation. Consider using a Web Application Firewall (WAF) to filter out requests containing suspicious path traversal patterns. Monitor MLflow server logs for unusual file access attempts.
Actualice la biblioteca mlflow a una versión posterior a la 2.9.2. Esto solucionará la vulnerabilidad de path traversal. Puede actualizar usando `pip install mlflow --upgrade`.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-1483 is a path traversal vulnerability in MLflow versions up to 2.9.2, allowing attackers to access arbitrary files on the server through crafted HTTP requests.
You are affected if you are running MLflow version 2.9.2 or earlier. Upgrade to 2.12.1 or later to resolve the vulnerability.
Upgrade MLflow to version 2.12.1 or later. As a temporary workaround, restrict network access and implement WAF rules to filter malicious requests.
While no widespread exploitation has been confirmed, the vulnerability's ease of exploitation suggests a potential for active exploitation. Monitor your systems for suspicious activity.
Refer to the MLflow security advisory for detailed information and updates: [https://mlflow.org/docs/security](https://mlflow.org/docs/security)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.