CVE-2023-43472

An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

History

11 Dec 2023, 15:32

Type Values Removed Values Added
CPE cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References () https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-language-model-security-contrast-security - () https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-language-model-security-contrast-security - Exploit, Press/Media Coverage
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Lfprojects
Lfprojects mlflow

05 Dec 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-05 07:15

Updated : 2023-12-11 15:32


NVD link : CVE-2023-43472

Mitre link : CVE-2023-43472

CVE.ORG link : CVE-2023-43472


JSON object : View

Products Affected

lfprojects

  • mlflow