icon

We found results for “

WS-2023-0114

Good to know:

icon

Date: April 28, 2023

A Remote file access vulnerability was found in `mlflow server` and `mlflow ui` CLIs. Users of the MLflow Open Source Project who are hosting the MLflow Model Registry using the mlflow server or mlflow ui commands using an MLflow version older than MLflow 2.3.1 may be vulnerable to a remote file access exploit if they are not limiting who can query their server (for example, by using a cloud VPC, an IP allowlist for inbound requests, or authentication / authorization middleware). This issue only affects users and integrations that run the mlflow server and mlflow ui commands. Integrations that do not make use of mlflow server or mlflow ui are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way. This vulnerability has been patched in MLflow 2.3.1.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Relative Path Traversal

CWE-23

Top Fix

icon

Upgrade Version

Upgrade to version mlflow - 2.3.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us