High Severity

mlflow

Path Traversal Vulnerability in Artifact Deletion Process

A path traversal vulnerability was identified in mlflow version 2.9.2, allowing attackers to delete arbitrary directories by bypassing URL encoding checks. The vulnerability, tracked as CVE-2023-6831, was patched in a subsequent release after 2.9.2.

Available publicly on Apr 16 2024

8.1

CVSS:

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Credit:

ozelis
Threat Overview

The vulnerability stems from the application's handling of artifact deletion requests. Specifically, the application fails to properly decode and sanitize the 'path' parameter, allowing attackers to craft malicious URLs that bypass path validation checks. This flaw enables attackers to traverse the server's directory structure and delete files or directories outside the intended scope. The issue is exacerbated by the application's repeated decoding of the URL, which under certain conditions, can lead to the bypassing of security checks designed to prevent such traversal attacks.

Attack Scenario

An attacker crafts a specially encoded URL that exploits the path traversal vulnerability by including encoded representations of directory traversal sequences (e.g., '../../../'). The attacker sends a DELETE request to the server with this malicious URL. Due to insufficient URL decoding and validation, the server processes the request, interpreting the encoded path as a legitimate directory traversal, leading to the deletion of arbitrary directories on the server's filesystem.

Who is affected

Servers running mlflow version 2.9.2 are vulnerable to this attack. Administrators and users of such systems are at risk of unauthorized file and directory deletions, which could lead to data loss, service disruption, and potentially further exploitation if critical system files are targeted.

Technical Report
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have 291 related security advisories that are available with Sightline Premium.