Home » Database

AVID-2026-R1355

Description

Remote Code Execution due to Full Controlled File Write in mlflow/mlflow (CVE-2024-0520)

Details

A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command (‘Command Injection’) within the mlflow.data.http_dataset_source.py module. Specifically, when loading a dataset from a source URL with an HTTP scheme, the filename extracted from the Content-Disposition header or the URL path is used to generate the final file path without proper sanitization. This flaw enables an attacker to control the file path fully by utilizing path traversal or absolute path techniques, such as ‘../../tmp/poc.txt’ or ‘/tmp/poc.txt’, leading to arbitrary file write. Exploiting this vulnerability could allow a malicious user to execute commands on the vulnerable machine, potentially gaining access to data and model information. The issue is fixed in version 2.9.0.

Reason for inclusion in AVID: The candidate describes a critical remote code execution (RCE) vulnerability in MLflow (mlflow/mlflow) via improper sanitization in dataset loading, enabling full control over file paths and arbitrary file write. MLflow is a core AI tooling component used in ML pipelines, making this a software supply-chain-relevant vulnerability for general-purpose AI systems. Evidence includes CVE-2024-0520 details, high/severity CVSS metrics, and the fix in a newer version, supporting both AI relevance and security impact.

References

Affected or Relevant Artifacts

  • Developer: mlflow
  • Deployer: mlflow
  • Artifact Details:
TypeName
Systemmlflow/mlflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score10.0
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-06-06
  • Version: 0.3.3
  • AVID Entry