First published: Tue Dec 12 2023(Updated: )
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository mlflow/mlflow prior to 2.9.2.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.9.2 | 2.9.2 |
MLflow | <2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6709 is classified as a high-severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2023-6709, upgrade the mlflow package to version 2.9.2 or later.
CVE-2023-6709 affects mlflow versions prior to 2.9.2 installed via pip and certain configurations of mlflow.
CVE-2023-6709 is an improper neutralization vulnerability in a template engine which could lead to security risks.
There is no known workaround for CVE-2023-6709, and the best defense is to upgrade to the patched version.