Platform
python
Component
mlflow
Fixed in
2.12.1
CVE-2024-1483 describes a path traversal vulnerability discovered in MLflow, a platform for managing the machine learning lifecycle. This flaw allows attackers to potentially access sensitive files on the server by manipulating HTTP POST requests. The vulnerability affects versions of MLflow up to 2.9.2, and a fix is available in version 2.12.1.
The path traversal vulnerability in MLflow allows an attacker to bypass intended access controls and read arbitrary files on the server hosting the MLflow tracking server. By crafting malicious HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, leveraging '#' instead of '?', an attacker can navigate the server's file system. This could expose sensitive data such as configuration files, API keys, or even source code. Successful exploitation could lead to data breaches and compromise the confidentiality and integrity of the machine learning environment. The potential blast radius extends to any data stored and managed by MLflow.
CVE-2024-1483 was publicly disclosed on April 16, 2024. The vulnerability's ease of exploitation, combined with MLflow's widespread adoption in machine learning workflows, suggests a potential for active exploitation. No public proof-of-concept (PoC) code has been widely released as of this writing, but the vulnerability's nature makes it likely that PoCs will emerge. It is not currently listed on CISA KEV.
Exploit Status
EPSS
77.15% (99% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-1483 is to upgrade MLflow to version 2.12.1 or later, which includes the necessary input validation fixes. If upgrading immediately is not feasible, consider implementing temporary workarounds such as restricting network access to the MLflow tracking server to trusted sources only. Additionally, review and harden file system permissions to limit the potential impact of a successful exploit. Implement a Web Application Firewall (WAF) with rules to filter out requests containing suspicious characters or patterns in the 'artifact_location' and 'source' parameters.
Update the mlflow library to a version later than 2.9.2. This will resolve the path traversal vulnerability. You can update using `pip install mlflow --upgrade`.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-1483 is a path traversal vulnerability in MLflow versions up to 2.9.2, allowing attackers to access arbitrary files on the server through crafted HTTP requests.
You are affected if you are running MLflow version 2.9.2 or earlier. Upgrade to 2.12.1 or later to resolve the vulnerability.
Upgrade MLflow to version 2.12.1 or later. As a temporary workaround, restrict network access and implement WAF rules to filter malicious requests.
While no widespread exploitation has been confirmed, the vulnerability's ease of exploitation suggests a potential for active exploitation. Monitor your systems for suspicious activity.
Refer to the MLflow security advisory for detailed information and updates: [https://mlflow.org/docs/security](https://mlflow.org/docs/security)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.