Path Traversal via Fragment Component in Artifact Location
A vulnerability in mlflow version 2.9.2 allows attackers to read arbitrary files through path traversal using the fragment component in the `artifact_location` field when creating an experiment. This issue, similar to CVE-2023-6909 but exploiting the fragment component, was patched in the version following 2.9.2.
Available publicly on Apr 16 2024
Remediation Steps
- Update MLflow to the latest version immediately to mitigate this vulnerability.
- Review and sanitize all input fields that accept URIs to ensure they do not allow path traversal sequences.
- Consider implementing additional access controls or validation mechanisms to restrict the ability of untrusted users to create or modify experiments and models.
- Regularly audit your MLflow deployment for unexpected or malicious activity.
Patch Details
- Fixed Version: N/A
- Patch Commit: N/A
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.