First published: Wed Dec 20 2023(Updated: )
A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.9.2 | 2.9.2 |
MLflow | <2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6974 has been classified as a critical severity vulnerability due to the potential for remote code execution.
To fix CVE-2023-6974, update the mlflow package to version 2.9.2 or higher.
The potential impacts of CVE-2023-6974 include unauthorized access to internal HTTP(s) servers and remote code execution on affected machines.
CVE-2023-6974 affects mlflow versions prior to 2.9.2.
Organizations using vulnerable versions of mlflow are at risk from CVE-2023-6974, especially in environments where internal servers are accessible.