Loading HuntDB...

GHSA-5mvj-wmgj-7q8c

GitHub Security Advisory

mlflow vulnerable to Path Traversal

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the artifact deletion functionality. Attackers can bypass path validation by exploiting the double decoding process in the `_delete_artifact_mlflow_artifacts` handler and `local_file_uri_to_path` function, allowing for the deletion of arbitrary directories on the server's filesystem. This vulnerability is due to an extra unquote operation in the `delete_artifacts` function of `local_artifact_repo.py`, which fails to properly sanitize user-supplied paths. The issue is present up to version 2.9.2, despite attempts to fix a similar issue in CVE-2023-6831.

Affected Packages

PyPI mlflow
Affected versions: 0 (last affected: 2.9.2)

Related CVEs

Key Information

GHSA ID
GHSA-5mvj-wmgj-7q8c
Published
April 16, 2024 12:30 AM
Last Modified
April 16, 2024 6:18 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
mlflow
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 10, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.