CVE-2023-1177
CRITICAL
Published 2023-03-24T00:00:00.000Z
Actions:
CVSS Score
V3.1
9.3
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.478
probability
of exploitation in the wild
There is a 47.8% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.976
Higher than 97.6% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
Available Exploits
Mlflow <2.2.1 - Local File Inclusion
Mlflow before 2.2.1 is susceptible to local file inclusion due to path traversal \..\filename in GitHub repository mlflow/mlflow. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
ID: CVE-2023-1177
Author: iamnoooobpdresearch
Critical
References:
- https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28/
- https://github.com/mlflow/mlflow/commit/7162a50c654792c21f3e4a160eb1a0e6a34f6e6e
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1177
- https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28
- https://nvd.nist.gov/vuln/detail/CVE-2023-1177
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
References
Published: 2023-03-24T00:00:00.000Z
Last Modified: 2025-02-19T20:56:12.814Z
Copied to clipboard!