MLflow 漏洞列表
共找到 31 个与 MLflow 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2023-1177: MLflow get-artifact 任意文件读取漏洞 POC
使用 MLflow 模型注册表托管 MLflow 开源项目的用户 mlflow server或者 mlflow ui使用早于 MLflow 2.2.1 的 MLflow 版本的命令如果不限制谁可以查询其服务器(例如,通过使用云 VPC、入站请求的 IP 白名单或身份验证 /授权中间件) app="MLflow" -
CVE-2023-1177: Mlflow <2.2.1 - Local File Inclusion POC
Mlflow before 2.2.1 is susceptible to local file inclusion due to path traversal \..\filename in GitHub repository mlflow/mlflow. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
CVE-2023-2356: Mlflow <2.3.0 - Local File Inclusion POC
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. -
CVE-2023-2780: Mlflow <2.3.1 - Local File Inclusion Bypass POC
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1. -
CVE-2023-3765: MLflow Absolute Path Traversal POC
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. -
CVE-2023-43472: MLFlow < 2.8.1 - Sensitive Information Disclosure POC
An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API. -
CVE-2023-6018: Mlflow - Arbitrary File Write POC
An attacker can overwrite any file on the server hosting MLflow without any authentication. -
CVE-2023-6568: Mlflow - Cross-Site Scripting POC
The vulnerability allows an attacker to inject malicious code into the Content-Type header of a POST request, which is then reflected back to the user without proper sanitization or escaping. -
CVE-2023-6831: mlflow - Path Traversal POC
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. -
CVE-2023-6909: Mlflow <2.9.2 - Path Traversal POC
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. -
CVE-2023-6977: Mlflow <2.8.0 - Local File Inclusion POC
Mlflow before 2.8.0 is susceptible to local file inclusion due to path traversal in GitHub repository mlflow/mlflow. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
CVE-2024-1483: Mlflow < 2.9.2 - Path Traversal POC
A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers. -
CVE-2024-2928: MLflow < 2.11.3 - Path Traversal POC
MLflow versions prior to 2.11.3 are vulnerable to a Path Traversal attack due to improper URI fragment parsing. This vulnerability allows attackers to read arbitrary files on the server, potentially exposing sensitive information. -
CVE-2024-3848: Mlflow < 2.11.0 - Path Traversal POC
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This allows an attacker to construct a URL that, when processed, ignores the protocol scheme and uses the provided path for filesystem access. As a result, an attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by exploiting the way the application converts the URL into a filesystem path. The issue stems from insufficient validation of the fragment portion of the URL, leading to arbitrary file read through path traversal. -
CVE-2024-8859: Mlflow < 2.17.0 - Local File Inclusion POC
Mlflow before 2.17.0 is susceptible to local file inclusion due to path traversal in GitHub repository mlflow/mlflow. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. -
MLflow get-artifact /ajax-api/2.0/mlflow/experiments/create 目录遍历漏洞 (CVE-2024-3848) 无POC
MLflow 是一个机器学习的开源平台。MLflow 开源平台 get-artifact 存在目录遍历漏洞,攻击者可读取系统所有敏感文件。 -
MLflow get-artifact 目录遍历漏洞(CVE-2024-2928) 无POC
MLflow 是一个机器学习的开源平台。MLflow 开源平台 get-artifact 存在目录遍历漏洞,攻击者可读取系统所有敏感文件。 -
MLflow get-artifact /ajax-api/2.0/mlflow/experiments/create 目录遍历漏洞 (CVE-2024-1483) 无POC
MLflow 是一个机器学习的开源平台。MLflow 开源平台 get-artifact 存在目录遍历漏洞,攻击者可读取系统所有敏感文件。 -
MLflow get-artifact /ajax-api/2.0/mlflow/experiments/create 目录遍历漏洞 (CVE-2023-6909) 无POC
MLflow 是一个机器学习的开源平台。MLflow 开源平台 get-artifact 存在目录遍历漏洞,攻击者可通过路径遍历读取系统所有敏感文件,例如 SSH 密钥或内部配置文件,可能导致敏感信息泄露。 -
MLflow get-artifact /ajax-api/2.0/mlflow/model-versions/create 目录遍历漏洞(CVE-2023-6977) 无POC
MLflow 是一个机器学习的开源平台。MLflow 开源平台 get-artifact 存在目录遍历漏洞,攻击者可读取系统所有敏感文件。 -
MLflow目录遍历漏洞(CVE-2023-2356) 无POC
MLflow存在目录遍历漏洞,攻击者可以通过该漏洞获取大量敏感信息。 -
MLflow 未授权访问漏洞 无POC
未授权访问漏洞是指攻击者未经过身份验证或绕过身份验证机制,就能够访问系统资源或执行敏感操作的安全漏洞。这种漏洞可能导致敏感信息泄露、数据篡改、服务中断等严重后果,给系统安全性带来极大威胁。 MLflow 默认没有认证功能,导致任意用户都可以进入系统进行操作,详情参考:https://avd.aliyun.com/detail?id=AVD-2023-1660217×tamp__1384=n4%2BxnDBDRDyDgDGOxBqtoQ0QkYwDTWYUeD -
Mlflow CVE-2023-6909 目录遍历漏洞 无POC
Mlflow存在目录遍历漏洞,此漏洞是由于对artifact_location参数缺乏验证导致的。 -
mlflow CVE-2023-6831 目录遍历漏洞 无POC
mlflow中存在目录遍历漏洞,此漏洞是由于程序未充分验证用户输入的DELETE请求中包含数据所导致的。 -
MLflow CVE-2023-1176 目录遍历漏洞 无POC
MLflow 是一个简化机器学习开发的平台, 该应用中存在目录遍历漏洞,此漏洞是未充分验证用户输入的name参数的值导致的。 -
MLFlow 任意文件读取漏洞 无POC
-
MLflow CVE-2023-3765 目录遍历漏洞 无POC
-
MLflow 身份验证绕过 (CVE-2023-6014) 无POC
MLflow 2.0接口存在身份验证绕过,可以直接创建账号 -
MLflow存在目录遍历漏洞(CVE-2023-3765) 无POC
MLflow存在目录遍历漏洞(CVE-2023-3765) -
mlflow目录遍历漏洞(CVE-2023-2780) 无POC
使用MLflow模型注册表托管MLflow开源项目的mlflow server或者mlflow ui使用早于 MLflow 2.3.1版本的用户,如果不限制查询,则所有人均可查看其服务器。该系统存在目录遍历漏洞。 -
MLflow get-artifact 任意文件读取漏洞 (CVE-2023-1177) 无POC
使用MLflow模型注册表托管MLflow开源项目的mlflow server或者mlflow ui使用早于 MLflow 2.2.1版本的用户,如果不限制查询,则所有人均可查看其服务器。该系统存在目录遍历漏洞。