CVE-2023-6975

A malicious user could use this issue to get command execution on the vulnerable machine and get access to data & models information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

History

29 Dec 2023, 16:39

Type Values Removed Values Added
Summary
  • (es) Un usuario malintencionado podría utilizar este problema para ejecutar comandos en la máquina vulnerable y obtener acceso a información de datos y modelos.
CVSS v2 : unknown
v3 : 10.0
v2 : unknown
v3 : 9.8
First Time Lfprojects
Lfprojects mlflow
CPE cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
References () https://github.com/mlflow/mlflow/commit/b9ab9ed77e1deda9697fe472fb1079fd428149ee - () https://github.com/mlflow/mlflow/commit/b9ab9ed77e1deda9697fe472fb1079fd428149ee - Patch
References () https://huntr.com/bounties/029a3824-cee3-4cf1-b260-7138aa539b85 - () https://huntr.com/bounties/029a3824-cee3-4cf1-b260-7138aa539b85 - Exploit, Third Party Advisory

20 Dec 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-20 06:15

Updated : 2024-02-06 20:16


NVD link : CVE-2023-6975

Mitre link : CVE-2023-6975

CVE.ORG link : CVE-2023-6975


JSON object : View

Products Affected

lfprojects

  • mlflow
CWE
CWE-29

Path Traversal: '\..\filename'