Arbitrary Code Execution Vulnerability in MLflow Platform
CVE-2024-37059

8.8HIGH

Key Information:

Vendor
Mlflow
Status
Vendor
CVE Published:
4 June 2024

Summary

The MLflow platform contains a vulnerability where deserialization of untrusted data can occur in versions 0.5.0 and above. This vulnerability enables an attacker to upload a malicious PyTorch model, which, when interacted with, can execute arbitrary code on an end user's system. This poses significant risks to system integrity and confidentiality, as malicious code can compromise user data and potentially lead to larger security breaches. Implementing security best practices and promptly updating affected versions can help mitigate this threat.

Affected Version(s)

MLflow 0.5.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.