CVE-2024-2928
HIGH NUCLEIMLflow < 2.11.3 - Path Traversal
Title source: nucleiDescription
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.
Exploits (2)
nomisec
WORKING POC
3 stars
by nuridincersaygili · poc
https://github.com/nuridincersaygili/CVE-2024-2928
Nuclei Templates (1)
MLflow < 2.11.3 - Path Traversal
HIGHVERIFIEDby jyjyjy25,gy741,oriing,ANseunghyeon,woo4826
Shodan:
http.title:"mlflow"
FOFA:
title="mlflow" || app="mlflow"
Scores
CVSS v3
7.5
EPSS
0.9165
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-29
CWE-22
Status
published
Products (2)
lfprojects/mlflow
< 2.11.3
pypi/mlflow
0 - 2.11.3PyPI
Published
Jun 06, 2024
Tracked Since
Feb 18, 2026