CVE-2024-3573: MLflow: LFI via URI parsing allows arbitrary file read
CRITICAL PoC AVAILABLE CISA: TRACK*Any internet-exposed MLflow instance is trivially exploitable with no credentials required — attackers can read system files including cloud credentials, API keys, and ML pipeline configs. Patch immediately or network-isolate MLflow; treat all secrets accessible to the MLflow process as compromised. This is not theoretical: a working exploit exists on huntr.
Risk Assessment
Critical risk in practice. CVSS 9.3 with network attack vector, no auth, no user interaction, and scope change (S:C) makes this weaponizable at scale. MLflow is routinely deployed in data science environments with privileged access to cloud provider credentials, model registries, and training infrastructure. High exposure for organizations running self-hosted MLflow without network segmentation, which is common in ML-heavy teams. The scope change implies impact beyond the MLflow process itself — harvested credentials enable lateral movement into cloud accounts and downstream AI infrastructure.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Apply MLflow commit 438a450714a3ca06285eeea34bdc6cf79d7f6cbc or upgrade to a fixed release immediately.
-
ISOLATE
If patching is not immediate, restrict MLflow to internal network access only — no internet exposure under any circumstance.
-
AUDIT
Review MLflow API logs for model version creation requests with unusual 'source' parameters — look for file://, empty scheme URIs, or path traversal sequences (../, %2e%2e).
-
ROTATE
Assume credentials accessible to the MLflow process are compromised — rotate cloud IAM keys, database passwords, and API tokens.
-
DETECT
Add SIEM/WAF rules alerting on MLflow API calls with 'source' field containing file://, empty scheme, or path traversal patterns.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-3573?
Any internet-exposed MLflow instance is trivially exploitable with no credentials required — attackers can read system files including cloud credentials, API keys, and ML pipeline configs. Patch immediately or network-isolate MLflow; treat all secrets accessible to the MLflow process as compromised. This is not theoretical: a working exploit exists on huntr.
Is CVE-2024-3573 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-3573, increasing the risk of exploitation.
How to fix CVE-2024-3573?
1. PATCH: Apply MLflow commit 438a450714a3ca06285eeea34bdc6cf79d7f6cbc or upgrade to a fixed release immediately. 2. ISOLATE: If patching is not immediate, restrict MLflow to internal network access only — no internet exposure under any circumstance. 3. AUDIT: Review MLflow API logs for model version creation requests with unusual 'source' parameters — look for file://, empty scheme URIs, or path traversal sequences (../, %2e%2e). 4. ROTATE: Assume credentials accessible to the MLflow process are compromised — rotate cloud IAM keys, database passwords, and API tokens. 5. DETECT: Add SIEM/WAF rules alerting on MLflow API calls with 'source' field containing file://, empty scheme, or path traversal patterns.
What systems are affected by CVE-2024-3573?
This vulnerability affects the following AI/ML architecture patterns: MLflow experiment tracking deployments, model registry, training pipelines, ML platform infrastructure, model serving.
What is the CVSS score for CVE-2024-3573?
CVE-2024-3573 has a CVSS v3.1 base score of 9.3 (CRITICAL). The EPSS exploitation probability is 0.20%.
Technical Details
NVD Description
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.
Exploitation Scenario
An attacker scans Shodan/Censys for internet-exposed MLflow tracking servers (common in data science teams that deploy without authentication). They send a POST to /api/2.0/mlflow/model-versions/create with a crafted 'source' parameter using an empty scheme or file:// URI. The is_local_uri check misclassifies the URI as non-local and MLflow processes it, returning file contents in the response. The attacker iterates: reads /proc/self/environ for environment variables containing API keys, reads ~/.aws/credentials for cloud credentials, reads MLflow's own .env for database passwords. With cloud credentials in hand, they pivot to S3 to exfiltrate model weights and training datasets, or escalate privileges in the cloud account.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N References
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert