Path Traversal Vulnerability in MLflow Product by Databricks
CVE-2024-8859
7.5HIGH
Summary
A path traversal vulnerability has been identified in MLflow version 2.15.1 developed by Databricks. This vulnerability occurs when users configure and utilize the DBFS service, allowing an attacker to read arbitrary files. The issue arises due to inadequate validation of the URL; only the path portion is checked, leaving other components, such as query strings and parameters, unverified. The vulnerability is provoked if the DBFS service is mounted to a local directory during its use.
Affected Version(s)
mlflow/mlflow < 2.17.0
References
EPSS Score
19% chance of being exploited in the next 30 days.
CVSS V3.0
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved