Skip to main content

Path Traversal: '\..\filename'

CVE-2024-2928

Severity High
Score 7.5/10

Summary

A Local File Inclusion (LFI) vulnerability was identified in mlflow. This vulnerability arises from the application's failure to properly validate URI fragments for Directory Traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks. This issue affects mlflow package versions prior to 2.11.3.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • NONE

CWE-29 - Path Traversal: '\..\filename'

The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.

Advisory Timeline

  • Published