Arbitrary Code Execution Vulnerability in MLflow Platform
CVE-2024-37058
8.8HIGH
Summary
The MLflow platform version 2.5.0 and above is susceptible to a vulnerability that allows deserialization of untrusted data. This issue arises when a Langchain AgentExecutor model is maliciously uploaded, enabling attackers to execute arbitrary code on the systems of users interacting with such models. As a result, this vulnerability could potentially compromise system integrity, allowing unauthorized access and manipulation of system resources.
Affected Version(s)
MLflow 2.5.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved