Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0520: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in mlflow mlflow/mlflow

0
Critical
VulnerabilityCVE-2024-0520cvecve-2024-0520cwe-22
Published: Thu Jun 06 2024 (06/06/2024, 18:19:36 UTC)
Source: CVE Database V5
Vendor/Project: mlflow
Product: mlflow/mlflow

Description

A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper neutralization of special elements used in an OS command ('Command Injection') within the `mlflow.data.http_dataset_source.py` module. Specifically, when loading a dataset from a source URL with an HTTP scheme, the filename extracted from the `Content-Disposition` header or the URL path is used to generate the final file path without proper sanitization. This flaw enables an attacker to control the file path fully by utilizing path traversal or absolute path techniques, such as '../../tmp/poc.txt' or '/tmp/poc.txt', leading to arbitrary file write. Exploiting this vulnerability could allow a malicious user to execute commands on the vulnerable machine, potentially gaining access to data and model information. The issue is fixed in version 2.9.0.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:10:10 UTC

Technical Analysis

CVE-2024-0520 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) affecting mlflow/mlflow, specifically version 8.2.1. The vulnerability exists in the module `mlflow.data.http_dataset_source.py` where the software loads datasets from HTTP sources. When a dataset is fetched, the filename is extracted from the HTTP response's Content-Disposition header or the URL path. Due to insufficient sanitization, an attacker can craft filenames containing path traversal sequences (e.g., '../../tmp/poc.txt') or absolute paths (e.g., '/tmp/poc.txt'), allowing arbitrary file writes outside the intended directory. This improper neutralization of special elements leads to command injection opportunities, enabling remote code execution on the host system. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.0 base score is 10.0, indicating critical severity with full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the flaw poses a significant risk to environments running vulnerable mlflow versions. The issue is resolved in mlflow version 2.9.0, which includes proper sanitization and validation of file paths to prevent path traversal and command injection.

Potential Impact

For European organizations, the impact of CVE-2024-0520 is severe. Mlflow is widely used in data science, machine learning, and AI workflows, sectors that are rapidly growing across Europe. Successful exploitation could lead to unauthorized access to sensitive datasets, intellectual property, and machine learning models, potentially causing data breaches and intellectual property theft. Attackers could execute arbitrary commands, leading to system compromise, lateral movement within networks, and disruption of critical AI services. This is particularly concerning for industries such as finance, healthcare, automotive, and research institutions that rely heavily on AI and data analytics. The breach of confidentiality and integrity could also violate GDPR regulations, leading to legal and financial penalties. The availability of AI services could be impacted, causing operational downtime and loss of trust. Given the criticality and ease of exploitation, organizations face a high risk of targeted attacks if unpatched.

Mitigation Recommendations

European organizations should immediately upgrade mlflow to version 2.9.0 or later, where the vulnerability is fixed. Until patching is possible, implement strict network-level controls to restrict access to mlflow services, especially from untrusted networks. Employ Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) to detect and block suspicious HTTP requests containing path traversal patterns. Conduct thorough input validation and sanitization on any user-supplied filenames or URLs before processing. Monitor logs for unusual file write activities or command execution attempts related to mlflow processes. Isolate mlflow instances in segmented network zones with minimal privileges to limit potential damage. Regularly audit and review machine learning pipelines and data sources for anomalies. Educate development and operations teams about secure coding practices related to file handling and external data ingestion. Finally, maintain an incident response plan tailored to AI infrastructure compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-01-14T15:26:16.946Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b21178f764e1f4709a2

Added to database: 10/15/2025, 1:01:21 PM

Last enriched: 10/15/2025, 1:10:10 PM

Last updated: 11/27/2025, 5:40:17 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats