You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I want to develop a plugin for mlflow LFI - CVE-2024-2928
Vulnerability Information: This vulnerability enables malicious users to read sensitive files on the server. It also covers CVE-2023-6909 because it is a new bypass. Both CVEs doesn't exist in Tsunami Plugins.
The vulnerability requires five HTTP requests one is GET and the other four are POST. After creating a model and an experiment after linking them, one can read files on the filesystem.
The text was updated successfully, but these errors were encountered:
frkngksl
changed the title
AI PRP: Arbitrary File Read in mlflow CVE-2023-6977
AI PRP: Arbitrary File Read in mlflow CVE-2024-2928
Jun 14, 2024
tooryx
added
the
Contributor queue
When a contributor has already one issue/PR in review, we put the following ones on hold with this.
label
Jun 24, 2024
tooryx
added
Contributor main
The main issue a contributor is working on (top of the contribution queue).
and removed
Contributor queue
When a contributor has already one issue/PR in review, we put the following ones on hold with this.
labels
Aug 19, 2024
Hi,
I want to develop a plugin for mlflow LFI - CVE-2024-2928
Vulnerability Information: This vulnerability enables malicious users to read sensitive files on the server. It also covers CVE-2023-6909 because it is a new bypass. Both CVEs doesn't exist in Tsunami Plugins.
Vulnerable Versions are below the 2.11.3
References:
The vulnerability requires five HTTP requests one is GET and the other four are POST. After creating a model and an experiment after linking them, one can read files on the filesystem.
The text was updated successfully, but these errors were encountered: