CVE-2024-3848: Mlflow < 2.11.0 - Path Traversal

CVE-2024-3848: Mlflow < 2.11.0 - Path Traversal-渗透云记 - 专注于网络安全与技术分享
CVE-2024-3848: Mlflow < 2.11.0 - Path Traversal
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2024-3848: MLflow < 2.11.0 – Path Traversal

漏洞描述

A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This allows an attacker to construct a URL that, when processed, ignores the protocol scheme and uses the provided path for filesystem access. As a result, an attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by exploiting the way the application converts the URL into a filesystem path. The issue stems from insufficient validation of the fragment portion of the URL, leading to arbitrary file read through path traversal.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享