cve/2023/CVE-2023-6023.md

18 lines
698 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6023)
![](https://img.shields.io/static/v1?label=Product&message=vertaai%2Fmodeldb&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-29%20Path%20Traversal%3A%20'%5C..%5Cfilename'&color=brighgreen)
### Description
An attacker can read any file on the filesystem on the server hosting ModelDB through an LFI in the artifact_path URL parameter.
### POC
#### Reference
- https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca
#### Github
No PoCs found on GitHub currently.