The mlflow web server includes tools for tracking experiments, packaging code into reproducible runs, and sharing and deploying models. As this vulnerability allows to write / overwrite any file on the file system, it gives a lot of ways to archive code execution (like overwriting /home/<user>/.bashrc
). A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
{ "nvd_published_at": "2023-11-16T16:15:34Z", "cwe_ids": [ "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-11-28T21:58:57Z" }