Loading HuntDB...

GHSA-m49c-5c52-6696

GitHub Security Advisory

mlflow vulnerable to Path Traversal

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

A path traversal vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the `artifact_location` parameter when creating an experiment. Attackers can exploit this vulnerability by using a fragment component `#` in the artifact location URI to read arbitrary files on the server in the context of the server's process. This issue is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect.

Affected Packages

PyPI mlflow
Affected versions: 0 (last affected: 2.9.2)

Related CVEs

Key Information

GHSA ID
GHSA-m49c-5c52-6696
Published
April 16, 2024 12:30 AM
Last Modified
April 16, 2024 6:19 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
mlflow
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 10, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.