Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
An attacker can overwrite any file on the server hosting MLflow without any authentication.
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1.