Information Exposure Affecting mlflow package, versions [2.0.0,2.9.0)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
1.5% (88th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-MLFLOW-6099131
- published 5 Dec 2023
- disclosed 5 Dec 2023
- credit Joseph Beeton
Introduced: 5 Dec 2023
CVE-2023-43472 Open this link in a new tabHow to fix?
Upgrade mlflow
to version 2.9.0 or higher.
Overview
mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.
Affected versions of this package are vulnerable to Information Exposure via a request to the REST API using text/plain
content type, which is passed unvalidated. An attacker can obtain sensitive information by redirecting output to an arbitrary artifact_location
that they control.
CVSS Scores
version 3.1