3.11.1
5 years ago
1 days ago
Known vulnerabilities in the mlflow-skinny package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via unsafe parsing of YAML-based MLmodel artifacts in the web interface. An attacker can execute arbitrary scripts in the context of another user's browser session by uploading a crafted MLmodel file containing malicious payloads, which are triggered when the artifact is viewed in the UI. This can lead to actions such as session hijacking or performing unauthorized operations on behalf of the victim. How to fix Cross-site Scripting (XSS)? Upgrade | [,3.11.0rc1) |
Affected versions of this package are vulnerable to Missing Authorization due to missing access-control validation in the How to fix Missing Authorization? Upgrade | [,3.11.0rc1) |
Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the Note: This is only exploitable if job execution is enabled ( How to fix Missing Authentication for Critical Function? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere in the tracing and assessment endpoints. An attacker can access sensitive trace metadata and create unauthorized assessments by authenticating with any user account, even those with no permissions on the experiment. How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere? Upgrade | [,3.11.0rc0) |