Vulnerability Description
A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lfprojects | Mlflow | < 2.9.2 |
Related Weaknesses (CWE)
References
- https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555Patch
- https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393ExploitThird Party Advisory
- https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555Patch
- https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393ExploitThird Party Advisory
FAQ
What is CVE-2023-6974?
CVE-2023-6974 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
How severe is CVE-2023-6974?
CVE-2023-6974 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-6974?
Check the references section above for vendor advisories and patch information. Affected products include: Lfprojects Mlflow.