CVE-2024-2928

HIGH NUCLEI

MLflow < 2.11.3 - Path Traversal

Title source: nuclei

Description

A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.

Exploits (2)

nomisec WORKING POC 3 stars
by nuridincersaygili · poc
https://github.com/nuridincersaygili/CVE-2024-2928
nomisec WRITEUP 1 stars
by rain321654 · poc
https://github.com/rain321654/sjtu_CVE-2024-2928

Nuclei Templates (1)

MLflow < 2.11.3 - Path Traversal
HIGHVERIFIEDby jyjyjy25,gy741,oriing,ANseunghyeon,woo4826
Shodan: http.title:"mlflow"
FOFA: title="mlflow" || app="mlflow"

Scores

CVSS v3 7.5
EPSS 0.9165
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-29 CWE-22
Status published
Products (2)
lfprojects/mlflow < 2.11.3
pypi/mlflow 0 - 2.11.3PyPI
Published Jun 06, 2024
Tracked Since Feb 18, 2026