Safety vulnerability ID: 60592
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Mlflow 2.3.1 includes a fix for a Relative Path Traversal vulnerability. By creating a model version through the REST API endpoint api/2.0/mlflow/registered-models/create and specifying a relative path redirection to the source argument, local server files can be accessed on the tracking server when a subsequent REST API v1.1 call is made tomodel-versions/get-artifact` and providing any path on the local file system.
https://github.com/advisories/GHSA-x422-6qhv-p29g
Latest version: 2.19.0
MLflow is an open source platform for the complete machine learning lifecycle
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application