First published: Tue Dec 19 2023(Updated: )
with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.9.2 | 2.9.2 |
MLflow | <2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6940 is classified as a critical vulnerability due to its ability to allow full command execution on the victim system with minimal user interaction.
To fix CVE-2023-6940, update the mlflow package to version 2.9.2 or later.
The risks associated with CVE-2023-6940 include unauthorized command execution by attackers, leading to potential system compromise.
CVE-2023-6940 affects users of the mlflow package versions prior to 2.9.2.
CVE-2023-6940 exploits the system by allowing attackers to execute commands through a malicious configuration file that requires only one user download interaction.