A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://huntr.com/bounties/029a3824-cee3-4cf1-b260-7138aa539b85 | third party advisory exploit |
https://github.com/mlflow/mlflow/commit/b9ab9ed77e1deda9697fe472fb1079fd428149ee | patch |