CVE-2024-1558

Public Exploit
Path Traversal Vulnerability in mlflow/mlflow

Description

A path traversal vulnerability exists in the `_create_model_version()` function within `server/handlers.py` of the mlflow/mlflow repository, due to improper validation of the `source` parameter. Attackers can exploit this vulnerability by crafting a `source` parameter that bypasses the `_validate_non_local_source_contains_relative_paths(source)` function's checks, allowing for arbitrary file read access on the server. The issue arises from the handling of unquoted URL characters and the subsequent misuse of the original `source` value for model version creation, leading to the exposure of sensitive files when interacting with the `/model-versions/get-artifact` handler.

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
CVSS 3.0 •
EPSS 0.20%
Third-Party Advisory huntr.com
Affected: mlflow mlflow/mlflow
Published at:
Updated at:

References

Link Tags
https://huntr.com/bounties/7f4dbcc5-b6b3-43dd-b310-e2d0556a8081 third party advisory issue tracking exploit

Frequently Asked Questions

What is the severity of CVE-2024-1558?
CVE-2024-1558 has been scored as a high severity vulnerability.
How to fix CVE-2024-1558?
To fix CVE-2024-1558, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-1558 being actively exploited in the wild?
It is possible that CVE-2024-1558 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-1558?
CVE-2024-1558 affects mlflow mlflow/mlflow.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.