This vulnerability enables malicious users to read sensitive files on the server.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf | third party advisory exploit |
https://github.com/mlflow/mlflow/commit/4bd7f27c810ba7487d53ed5ef1038fca0f8dc28c | patch |