CVE-2024-8859: MLflow: path traversal allows arbitrary file read via DBFS
GHSA-4rqf-8pfm-p36r HIGH PoC AVAILABLE CISA: TRACK*Any MLflow deployment with DBFS configured and network-accessible is vulnerable to unauthenticated arbitrary file reads — no credentials required. An attacker can exfiltrate model weights, credentials, API keys, and config files stored on the host. Patch to 2.17.0rc0+ immediately or disable DBFS if not in use.
Risk Assessment
High risk for MLOps teams running MLflow with DBFS enabled. CVSS 7.5 with zero authentication required (AV:N/AC:L/PR:N/UI:N) means this is trivially exploitable over the network. EPSS of 0.269 indicates ~27% exploitation probability within 30 days. A public PoC exists on huntr.com. MLflow servers are often deployed internally but many teams expose them on corporate networks or cloud VPCs with permissive security groups — significantly expanding the attack surface beyond what CVSS alone suggests.
Affected Systems
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH
Upgrade to mlflow>=2.17.0rc0 immediately. The fix is in commit 7791b8cdd595f21b5f179c7b17e4b5eb5cbbe654.
-
WORKAROUND
If patching is not immediately possible, disable DBFS service or restrict MLflow network access to trusted IPs only via firewall/security groups.
-
AUDIT
Review what files are readable by the MLflow process user — apply principle of least privilege.
-
ROTATE
Assume any credentials, API keys, or secrets on the MLflow host may be compromised if the server was publicly accessible.
-
DETECT
Check web/application logs for requests containing path traversal sequences (../, %2e%2e, %252e) in DBFS-related endpoints.
-
SCAN
Inventory all MLflow instances in your environment; shadow IT ML servers are common in data science teams.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-8859?
Any MLflow deployment with DBFS configured and network-accessible is vulnerable to unauthenticated arbitrary file reads — no credentials required. An attacker can exfiltrate model weights, credentials, API keys, and config files stored on the host. Patch to 2.17.0rc0+ immediately or disable DBFS if not in use.
Is CVE-2024-8859 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-8859, increasing the risk of exploitation.
How to fix CVE-2024-8859?
1. PATCH: Upgrade to mlflow>=2.17.0rc0 immediately. The fix is in commit 7791b8cdd595f21b5f179c7b17e4b5eb5cbbe654. 2. WORKAROUND: If patching is not immediately possible, disable DBFS service or restrict MLflow network access to trusted IPs only via firewall/security groups. 3. AUDIT: Review what files are readable by the MLflow process user — apply principle of least privilege. 4. ROTATE: Assume any credentials, API keys, or secrets on the MLflow host may be compromised if the server was publicly accessible. 5. DETECT: Check web/application logs for requests containing path traversal sequences (../, %2e%2e, %252e) in DBFS-related endpoints. 6. SCAN: Inventory all MLflow instances in your environment; shadow IT ML servers are common in data science teams.
What systems are affected by CVE-2024-8859?
This vulnerability affects the following AI/ML architecture patterns: MLOps pipelines, model training pipelines, model registries, experiment tracking systems, CI/CD ML pipelines.
What is the CVSS score for CVE-2024-8859?
CVE-2024-8859 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 25.69%.
Technical Details
NVD Description
A path traversal vulnerability exists in mlflow/mlflow version 2.15.1. When users configure and use the dbfs service, concatenating the URL directly into the file protocol results in an arbitrary file read vulnerability. This issue occurs because only the path part of the URL is checked, while parts such as query and parameters are not handled. The vulnerability is triggered if the user has configured the dbfs service, and during usage, the service is mounted to a local directory.
Exploitation Scenario
An adversary scans for exposed MLflow instances (default port 5000/5001) via Shodan or internal network scanning. They identify a deployment with DBFS configured and mounted to the host filesystem. They craft a malicious URL that passes path traversal sequences in the query parameter rather than the path component — bypassing MLflow's incomplete path validation — and issue a GET request like: `GET /api/2.0/dbfs/read?path=../../../../../../etc/passwd`. The server follows the file:// protocol with the unsanitized input and returns the file contents. The attacker iterates to read ~/.aws/credentials, .env files, or MLflow's own database connection config, extracting cloud keys or database passwords to pivot deeper into the ML infrastructure.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References
- github.com/advisories/GHSA-4rqf-8pfm-p36r
- nvd.nist.gov/vuln/detail/CVE-2024-8859
- github.com/mlflow/mlflow/commit/7791b8cdd595f21b5f179c7b17e4b5eb5cbbe654 Patch
- huntr.com/bounties/2259b88b-a0c6-4c7c-b434-6aacf6056dcb Exploit 3rd Party
- github.com/20142995/nuclei-templates Exploit
- github.com/cyb3r-w0lf/nuclei-template-collection Exploit
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert