CVE-2024-3573

CRITICAL

mlflow/mlflow - LFI

Title source: llm
STIX 2.1

Description

mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.

Scores

CVSS v3 9.3
EPSS 0.0020
EPSS Percentile 41.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-29 CWE-22
Status published
Products (2)
lfprojects/mlflow < 2.10.0
pypi/mlflow 0 - 2.10.0PyPI
Published Apr 16, 2024
Tracked Since Feb 18, 2026