mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
20 lines
1.3 KiB
Markdown
20 lines
1.3 KiB
Markdown
### [CVE-2024-2928](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2928)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/EssenceCyber/Exploit-List
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/nuridincersaygili/CVE-2024-2928
|
|
|