Home » Database

AVID-2026-R1394

Description

Path Traversal Vulnerability in mlflow/mlflow (CVE-2024-1483)

Details

A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted ‘artifact_location’ and ‘source’ parameters, using a local URI with ‘#’ instead of ‘?’, an attacker can traverse the server’s directory structure. The issue occurs due to insufficient validation of user-supplied input in the server’s handlers.

Reason for inclusion in AVID: CVE-2024-1483 describes a path traversal vulnerability in mlflow/mlflow, a software component widely used in AI/ML workflows for experiment tracking, packaging, and deployment. This vulnerability is in software used to build/deploy AI systems, representing a security flaw in the AI supply chain stack (dependencies/serving components). It is not hardware-only, has clear exploitation mechanics (path traversal leading to file access), and is well-documented with CVE and CVSS details. Therefore it satisfies AI relevance, GPAI supply chain relevance, security impact, and sufficiency of evidence.

References

Affected or Relevant Artifacts

  • Developer: mlflow
  • Deployer: mlflow
  • Artifact Details:
TypeName
Systemmlflow/mlflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score7.5
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-04-16
  • Version: 0.3.3
  • AVID Entry