MLflow.validate_path_is_safe.Path.Traversal
Description
This indicates an attack attempt to exploit a Path Traversal Vulnerability in MLFlow.
The vulnerability is due to insufficient input sanitization on some endpoints of the application. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. A remote attacker can exploit this to potentially take control and compromise the file system.
Affected Products
MLFlow 2.2.0 - 2.3.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://mlflow.org/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2024-04-04 | 27.761 | Default_action:pass:drop |
2024-03-26 | 27.755 | Sig Added |
2024-03-25 | 27.754 | Sig Added |
2024-03-20 | 27.752 |