CVE-2024-45190

Path Traversal: '.../...//' (CWE-35)

Published: Aug 23, 2024 / Updated: 2mo ago

010
CVSS 6.5EPSS 0.04%Medium
CVE info copied to clipboard

Summary

Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request

Impact

This vulnerability allows attackers with low-level privileges ("Viewer" role) to access and potentially exfiltrate sensitive files from the Mage server that they should not have access to. The confidentiality impact is high, as it could lead to unauthorized disclosure of sensitive information. However, there is no direct impact on the integrity or availability of the system.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability was addressed in a Github Advisory (GHSA-4mrc-w7jh-hx4j) published on August 23, 2024.

Mitigation

1. Update Mage AI to the latest patched version as soon as possible. 2. Implement the principle of least privilege, ensuring that users are only given the minimum necessary permissions. 3. Regularly audit user roles and access rights. 4. Implement additional access controls and input validation to prevent path traversal attacks. 5. Monitor for any suspicious file access patterns, especially from accounts with lower-level permissions.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-45190. See article

Aug 23, 2024 at 8:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Aug 23, 2024 at 8:21 PM
Threat Intelligence Report

CVE-2024-45190 is part of a series of vulnerabilities related to Remote Arbitrary File Leaks, which may pose significant risks to affected systems. The criticality, exploitation status, CVSS score, proof-of-concept exploits, mitigations, detections, patches, and potential downstream impacts on third-party vendors or technology are not specified in the provided information. Further investigation is necessary to assess the full implications of this vulnerability. See article

Nov 4, 2024 at 9:12 AM
Static CVE Timeline Graph

Affected Systems

Mage/ai
+null more

Patches

Github Advisory
+null more

Vendor Advisory

[GHSA-4mrc-w7jh-hx4j] Mage AI Path Traversal vulnerability
GitHub Security Advisory: GHSA-4mrc-w7jh-hx4j Release Date: 2024-08-23 Update Date: 2024-08-23 Severity: Moderate CVE-2024-45190 Base Score: 6.5 Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Package Information Package: mage-ai Affected Versions: Patched Versions: None Description Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request References https://nvd.nist.gov/vuln/detail/CVE-2024-45190 https://research.jfrog.com/vulnerabilities/mage-ai-pipeline-interaction-request-remote-arbitrary-file-leak-jfsa-2024-001039605

References

Machine Learning Bug Bonanza – Exploiting ML Services
While Weave is running as part of WANDB Server – by reading a specific file, the vulnerability allows a low-privileged authenticated user to escalate their privileges to an admin role. By hijacking ML model registries, attackers gain lateral movement within enterprise systems and can easily create backdoors to ML models that enable malicious code execution when pulled and loaded by any client (Data Scientists, MLOps CI/CD machines, etc.).

News

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
An improper access control vulnerability in the ZenML MLOps framework that allows a user with access to a managed ZenML server to elevate their privileges from a viewer to full admin privileges, granting the attacker the ability to modify or read the Secret Store (No CVE identifier) CVE-2024-45188, CVE-2024-45189, and CVE-2024-45190 (CVSS scores: 6.5) - Multiple path traversal vulnerabilities in Mage AI that allow remote users with the "Viewer" role to read arbitrary text files from the Mage server via "File Content," "Git Content," and "Pipeline Interaction" requests, respectively
Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
An improper access control vulnerability in the ZenML MLOps framework that allows a user with access to a managed ZenML server to elevate their privileges from a viewer to full admin privileges, granting the attacker the ability to modify or read the Secret Store (No CVE identifier) CVE-2024-45188, CVE-2024-45189, and CVE-2024-45190 (CVSS scores: 6.5) - Multiple path traversal vulnerabilities in Mage AI that allow remote users with the "Viewer" role to read arbitrary text files from the Mage server via "File Content," "Git Content," and "Pipeline Interaction" requests, respectively
Security Flaws In Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
An improper access control vulnerability in the ZenML MLOps framework that allows a user with access to a managed ZenML server to elevate their privileges from a viewer to full admin privileges, granting the attacker the ability to modify or read the Secret Store (No CVE identifier) CVE-2024-45188, CVE-2024-45189, and CVE-2024-45190 (CVSS scores: 6.5) - Multiple path traversal vulnerabilities in Mage AI that allow remote users with the "Viewer" role to read arbitrary text files from the Mage server via "File Content," "Git Content," and "Pipeline Interaction" requests, respectively
Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
An improper access control vulnerability in the ZenML MLOps framework that allows a user with access to a managed ZenML server to elevate their privileges from a viewer to full admin privileges, granting the attacker the ability to modify or read the Secret Store (No CVE identifier) CVE-2024-6507 (CVSS score: 8.1) – A command injection vulnerability in the Deep Lake AI-oriented database that allows attackers to inject system commands when uploading a remote Kaggle dataset due to a lack of proper input sanitization (addressed in version 3.9.11)
Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation
An improper access control vulnerability in the ZenML MLOps framework that allows a user with access to a managed ZenML server to elevate their privileges from a viewer to full admin privileges, granting the attacker the ability to modify or read the Secret Store (No CVE identifier) CVE-2024-45188, CVE-2024-45189, and CVE-2024-45190 (CVSS scores: 6.5) - Multiple path traversal vulnerabilities in Mage AI that allow remote users with the "Viewer" role to read arbitrary text files from the Mage server via "File Content," "Git Content," and "Pipeline Interaction" requests, respectively
See 13 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:None
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI