Arbitrary Code Execution Vulnerability in MLflow Platform
CVE-2024-37053

8.8HIGH

Key Information:

Vendor
Mlflow
Status
Vendor
CVE Published:
4 June 2024

Summary

A deserialization vulnerability exists in the MLflow platform, affecting versions 1.1.0 and newer. This vulnerability allows attackers to upload malicious scikit-learn models that can run arbitrary code when interacted with by an end user. Organizations leveraging MLflow for machine learning workflows must be vigilant, as exploitation could lead to unauthorized access and execution of harmful code on affected systems. Prompt action is imperative to mitigate the risks associated with this security flaw.

Affected Version(s)

MLflow 1.1.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.