First published: Mon Nov 25 2024(Updated: )
Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_udf() MLflow API is called.
Credit: reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/mlflow | <2.16.0 | 2.16.0 |
MLflow | <2.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27134 has a severity rating indicating a vulnerability that can lead to local privilege escalation.
To fix CVE-2024-27134, update MLflow to version 2.16.0 or later.
CVE-2024-27134 affects MLflow versions prior to 2.16.0.
A ToCToU attack in CVE-2024-27134 refers to a Time-of-Check Time-of-Use vulnerability that can be exploited by attackers with local access.
CVE-2024-27134 is relevant specifically when the spark_udf() API is used in MLflow.