-
CVSS Score
-The vulnerability stems from insufficient path validation in the URL processing logic. The commit diff shows the vulnerable function only checked for null bytes in the path component (urllib.parse.urlparse(source).path) but didn't validate against '..' path segments. Attackers could exploit this by embedding '..' in URL-encoded query/parameter portions (e.g., 'a%3f/../../..' as seen in the test case), which would be URL-decoded but not properly checked for traversal sequences. The patched version explicitly adds a check for '..' in path components, confirming this was the vulnerable function.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mlflow | pip |
Ongoing coverage of React2Shell