First published: Tue Dec 05 2023(Updated: )
An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.9.0 | 2.9.0 |
MLflow | <=2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43472 is categorized as a high severity vulnerability.
To fix CVE-2023-43472, upgrade MLFlow to version 2.9.0 or later.
MLFlow versions 2.8.1 and earlier are affected by CVE-2023-43472.
An attacker can obtain sensitive information via a crafted request to the MLFlow REST API due to CVE-2023-43472.
Yes, CVE-2023-43472 allows remote attackers to exploit the vulnerability.