First published: Wed Dec 20 2023(Updated: )
A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.9.2 | 2.9.2 |
MLflow | <2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6975 is considered a high severity vulnerability due to its ability to allow command execution on the vulnerable machine.
To fix CVE-2023-6975, upgrade the mlflow package to version 2.9.2 or later.
CVE-2023-6975 allows a malicious user to gain command execution on the vulnerable machine and access confidential data and model information.
CVE-2023-6975 affects all versions of mlflow prior to 2.9.2.
Yes, CVE-2023-6975 can be exploited remotely by a malicious user.