CVE-2023-6974

A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555 - Patch () https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555 - Patch
References () https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393 - Exploit, Third Party Advisory () https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393 - Exploit, Third Party Advisory

29 Dec 2023, 14:13

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.6
v2 : unknown
v3 : 9.8
Summary
  • (es) Un usuario malintencionado podría utilizar este problema para acceder a servidores HTTP internos y, en el peor de los casos (es decir, instancia de AWS), podría ser un abuso obtener una ejecución remota de código en la máquina víctima.
First Time Lfprojects
Lfprojects mlflow
References () https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555 - () https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555 - Patch
References () https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393 - () https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393 - Exploit, Third Party Advisory
CPE cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

20 Dec 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-20 06:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6974

Mitre link : CVE-2023-6974

CVE.ORG link : CVE-2023-6974


JSON object : View

Products Affected

lfprojects

  • mlflow
CWE
CWE-918

Server-Side Request Forgery (SSRF)