cve/2023/CVE-2023-2780.md

20 lines
765 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-2780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2780)
![](https://img.shields.io/static/v1?label=Product&message=mlflow%2Fmlflow&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%202.3.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-29%20Path%20Traversal%3A%20'%5C..%5Cfilename'&color=brighgreen)
### Description
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1.
### POC
#### Reference
- https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
2024-08-07 19:02:05 +00:00
- https://github.com/google/tsunami-security-scanner-plugins
2024-05-25 21:48:12 +02:00