CVE-2023-1177
Summary
| CVE | CVE-2023-1177 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-03-24 15:15:00 UTC |
| Updated | 2023-11-02 18:15:00 UTC |
| Description | Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1. |
Risk And Classification
Problem Types: CWE-29
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Lfprojects | Mlflow | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Apply `validate_path_is_safe` to `path` and `artifact_path` for `/mlflow-artifacts/` endpoints by harupy · Pull Request #7891 · mlflow/mlflow · GitHub | MISC | github.com | |
| Apply suggestions from code review · mlflow/mlflow@7162a50 · GitHub | MISC | github.com | |
| huntr: Page not found | CONFIRM | huntr.dev | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.