-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mlflow | pip | < 2.9.2 | 2.9.2 |
The vulnerability stems from improper path sanitization in the dataset loading functionality. The key indicators are:
The load() method was vulnerable because it used posixpath to handle filenames, which doesn't properly process Windows path separators, allowing attackers to escape directory restrictions through specially crafted filenames in Content-Disposition headers or URL paths.
Ongoing coverage of React2Shell