CVE-2023-1177
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2023-1177. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1EPSS Score
v2025.03.14There is a 93.2% chance that this vulnerability will be exploited in the wild within the next 30 days.
Attack Vector Metrics
Impact Metrics
Description
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
Available Exploits
Mlflow <2.2.1 - Local File Inclusion
Mlflow before 2.2.1 is susceptible to local file inclusion due to path traversal \..\filename in GitHub repository mlflow/mlflow. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
References:
- https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28/
- https://github.com/mlflow/mlflow/commit/7162a50c654792c21f3e4a160eb1a0e6a34f6e6e
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1177
- https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28
- https://nvd.nist.gov/vuln/detail/CVE-2023-1177
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
mlflow is vulnerable to remote file access in `mlflow server` and `mlflow ui` CLIs
GHSA-xg73-94fp-g449Advisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
Advisory provided by GitHub Security Advisory Database. Published: March 24, 2023, Modified: October 1, 2024