漏洞标题
由于mlflow/mlflow中完全可控的文件写入导致远程代码执行
漏洞描述信息
mlflow/mlflow版本8.2.1中的一个漏洞允许远程代码执行,因为在`mlflow.data.http_dataset_source.py`模块中处理OS命令('Command Injection')时,未正确消除用于操作的特殊元素。具体来说,当从具有HTTP方案的源URL加载数据集时,从`Content-Disposition`头部或URL路径中提取的文件名用于生成最终文件路径,而没有进行适当的净化。该漏洞使攻击者能够通过路径遍历或绝对路径等技术完全控制文件路径,导致任意文件写入。利用此漏洞可能允许恶意用户在易受攻击的机器上执行命令,从而可能获取数据和模型信息。此问题在版本2.9.0中得到了修复。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
漏洞标题
Remote Code Execution due to Full Controlled File Write in mlflow/mlflow
漏洞描述信息
A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command ('Command Injection') within the `mlflow.data.http_dataset_source.py` module. Specifically, when loading a dataset from a source URL with an HTTP scheme, the filename extracted from the `Content-Disposition` header or the URL path is used to generate the final file path without proper sanitization. This flaw enables an attacker to control the file path fully by utilizing path traversal or absolute path techniques, such as '../../tmp/poc.txt' or '/tmp/poc.txt', leading to arbitrary file write. Exploiting this vulnerability could allow a malicious user to execute commands on the vulnerable machine, potentially gaining access to data and model information. The issue is fixed in version 2.9.0.
CVSS信息
N/A
漏洞类别
相对路径遍历
漏洞标题
Mlflow 安全漏洞
漏洞描述信息
Mlflow是一个机器学习生命周期的开源平台。 Mlflow存在安全漏洞,该漏洞源于操作系统命令中使用的特殊元素未正确中和,从而导致攻击者能够利用路径遍历或绝对路径技术,实现任意文件写入。
CVSS信息
N/A
漏洞类别
其他