### [CVE-2023-6015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6015) ![](https://img.shields.io/static/v1?label=Product&message=mlflow%2Fmlflow&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) ### Description MLflow allowed arbitrary files to be PUT onto the server. ### POC #### Reference - https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3 #### Github - https://github.com/shubhamkulkarni97/CVE-Presentations