Vulnerabilities (CVE)

Filtered by CWE-29
Total 37 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-1561 2024-05-10 N/A 7.5 HIGH
An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.
CVE-2024-2083 2024-04-16 N/A 9.9 CRITICAL
A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
CVE-2024-3573 2024-04-16 N/A 9.3 CRITICAL
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.
CVE-2023-6831 1 Lfprojects 1 Mlflow 2024-02-13 N/A 8.1 HIGH
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
CVE-2023-6975 1 Lfprojects 1 Mlflow 2024-02-06 N/A 9.8 CRITICAL
A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
CVE-2023-6909 1 Lfprojects 1 Mlflow 2024-02-06 N/A 7.5 HIGH
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
CVE-2023-6977 1 Lfprojects 1 Mlflow 2023-12-29 N/A 7.5 HIGH
This vulnerability enables malicious users to read sensitive files on the server.
CVE-2023-6021 1 Ray Project 1 Ray 2023-12-06 N/A 7.5 HIGH
LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
CVE-2023-6023 1 Vertaai 1 Modeldb 2023-11-28 N/A 7.5 HIGH
An attacker can read any file on the filesystem on the server hosting ModelDB through an LFI in the artifact_path URL parameter.
CVE-2023-6130 1 Salesagility 1 Suitecrm 2023-11-17 N/A 8.8 HIGH
Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
CVE-2023-0104 1 Weintek 1 Easybuilder Pro 2023-11-07 N/A 7.8 HIGH
The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decompiling a malicious project file. This may allow an attacker to gain control of the user’s computer or gain access to sensitive data.  
CVE-2023-1177 1 Lfprojects 1 Mlflow 2023-11-02 N/A 9.8 CRITICAL
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
CVE-2022-2788 1 Emerson 1 Electric\'s Proficy 2023-06-28 N/A 7.3 HIGH
Emerson Electric's Proficy Machine Edition Version 9.80 and prior is vulnerable to CWE-29 Path Traversal: '\..\Filename', also known as a ZipSlip attack, through an upload procedure which enables attackers to implant a malicious .BLZ file on the PLC. The file can transfer through the engineering station onto Windows in a way that executes the malicious code.
CVE-2023-2984 2 Microsoft, Pimcore 2 Windows, Pimcore 2023-06-05 N/A 8.8 HIGH
Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22.
CVE-2023-2780 1 Lfprojects 1 Mlflow 2023-05-25 N/A 9.8 CRITICAL
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1.
CVE-2023-1034 1 Salesagility 1 Suitecrm 2023-03-06 N/A 8.8 HIGH
Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.12.9.
CVE-2023-0316 1 Froxlor 1 Froxlor 2023-01-24 N/A 5.5 MEDIUM
Path Traversal: '\..\filename' in GitHub repository froxlor/froxlor prior to 2.0.0.