First published: Fri Feb 23 2024(Updated: )
Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table fields.
Credit: reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.10.0 | 2.10.0 |
MLflow | <=2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27133 has a severity rating that indicates a significant risk due to its potential for client-side remote code execution.
To fix CVE-2024-27133, you should upgrade MLflow to version 2.10.0 or higher.
CVE-2024-27133 is caused by insufficient sanitization of dataset table fields in MLflow, which allows for cross-site scripting (XSS).
Users of MLflow versions prior to 2.10.0, as well as those using affected CPE configurations, are at risk from CVE-2024-27133.
Yes, CVE-2024-27133 can be exploited in Jupyter Notebook when running recipes that utilize untrusted datasets.