Plattform
python
Komponente
mlflow
Behoben in
2.9.3
CVE-2024-1560 describes a path traversal vulnerability discovered in the MLflow artifact deletion functionality. This flaw allows attackers to bypass path validation and delete arbitrary directories on the server's filesystem. The vulnerability impacts MLflow versions up to 2.9.2 and is caused by an extra unquote operation during path sanitization. A fix is available.
The primary impact of CVE-2024-1560 is the ability for an attacker to delete arbitrary files on the MLflow server. This can range from deleting critical configuration files, disrupting MLflow's operation, to deleting sensitive data stored within the artifact repository. Successful exploitation requires an attacker to interact with the artifact deletion endpoint, potentially through a crafted MLflow API request or a malicious experiment. The blast radius extends to any data stored within the MLflow artifact store, and could lead to denial of service if critical system files are deleted. While the vulnerability requires interaction with the artifact deletion functionality, the potential for widespread data loss makes it a significant concern.
CVE-2024-1560 was publicly disclosed on April 16, 2024. There is currently no indication of active exploitation campaigns. The vulnerability is not listed on the CISA KEV catalog at the time of writing. Public proof-of-concept exploits are currently available, increasing the risk of exploitation. The vulnerability's ease of exploitation and potential impact warrant close attention and prompt mitigation.
Organizations heavily reliant on MLflow for model tracking, deployment, and management are at significant risk. Specifically, environments with shared MLflow instances or those lacking robust access controls are particularly vulnerable. Users who have write access to the MLflow artifact store are potential threat actors.
• python / server:
import os
import subprocess
def check_mlflow_vulnerability():
try:
result = subprocess.run(['mlflow', 'artifacts', 'list'], capture_output=True, text=True, check=True)
if '2.9.2' in result.stdout:
print("MLflow version is vulnerable.")
else:
print("MLflow version is likely patched.")
except FileNotFoundError:
print("MLflow not found.")
check_mlflow_vulnerability()• linux / server:
journalctl -u mlflow -g 'artifact deletion' | grep -i error• generic web:
Use curl to test artifact deletion endpoints with path traversal payloads (e.g., curl 'http://mlflow-server/artifacts/../sensitive_file') and observe the response.
disclosure
Exploit-Status
EPSS
0.11% (29% Perzentil)
CVSS-Vektor
The primary mitigation for CVE-2024-1560 is to upgrade MLflow to a version that includes the fix. The vendor has not released a specific fixed version, so monitor the MLflow GitHub repository for updates. As a temporary workaround, restrict access to the artifact deletion endpoint to trusted users and systems. Implement strict input validation on any user-supplied paths used in artifact operations. Consider using a Web Application Firewall (WAF) to filter out potentially malicious requests targeting the artifact deletion endpoint. After upgrading, confirm the fix by attempting to delete a test artifact with a path containing traversal sequences (e.g., ../../../../etc/passwd) and verifying that the deletion fails with an appropriate error.
Actualice la biblioteca mlflow a una versión posterior a la 2.9.2. Esto solucionará la vulnerabilidad de path traversal. Puede actualizar usando `pip install mlflow --upgrade`.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-1560 is a Path Traversal vulnerability in MLflow versions up to 2.9.2, allowing attackers to delete arbitrary files on the server.
You are affected if you are using MLflow version 2.9.2 or earlier. Check your MLflow version and upgrade if necessary.
Upgrade to a patched version of MLflow. Consult the official MLflow release notes for the latest version with the fix.
There is currently no confirmed evidence of active exploitation, but public proof-of-concept exploits are available.
Refer to the MLflow GitHub security advisory: https://github.com/mlflow/mlflow/security/advisories/GHSA-9894-3937-3947
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.