AVID-2026-R1355
Description
Remote Code Execution due to Full Controlled File Write in mlflow/mlflow (CVE-2024-0520)
Details
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command (‘Command Injection’) within the mlflow.data.http_dataset_source.py module. Specifically, when loading a dataset from a source URL with an HTTP scheme, the filename extracted from the Content-Disposition header or the URL path is used to generate the final file path without proper sanitization. This flaw enables an attacker to control the file path fully by utilizing path traversal or absolute path techniques, such as ‘../../tmp/poc.txt’ or ‘/tmp/poc.txt’, leading to arbitrary file write. Exploiting this vulnerability could allow a malicious user to execute commands on the vulnerable machine, potentially gaining access to data and model information. The issue is fixed in version 2.9.0.
Reason for inclusion in AVID: The candidate describes a critical remote code execution (RCE) vulnerability in MLflow (mlflow/mlflow) via improper sanitization in dataset loading, enabling full control over file paths and arbitrary file write. MLflow is a core AI tooling component used in ML pipelines, making this a software supply-chain-relevant vulnerability for general-purpose AI systems. Evidence includes CVE-2024-0520 details, high/severity CVSS metrics, and the fix in a newer version, supporting both AI relevance and security impact.
References
- NVD entry
- https://huntr.com/bounties/93e470d7-b6f0-409b-af63-49d3e2a26dbc
- https://github.com/mlflow/mlflow/commit/400c226953b4568f4361bc0a0c223511652c2b9d
Affected or Relevant Artifacts
- Developer: mlflow
- Deployer: mlflow
- Artifact Details:
| Type | Name |
|---|---|
| System | mlflow/mlflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Base Score | 10.0 |
| Base Severity | 🔴 Critical |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | CHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-22 | CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-06-06
- Version: 0.3.3
- AVID Entry