CVE-2023-6974

A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

History

29 Dec 2023, 14:13

Type Values Removed Values Added
References () https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555 - () https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555 - Patch
References () https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393 - () https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393 - Exploit, Third Party Advisory
CPE cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

20 Dec 2023, 13:50

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-20 06:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-6974

Mitre link : CVE-2023-6974

CVE.ORG link : CVE-2023-6974


JSON object : View

Products Affected

lfprojects

  • mlflow
CWE
CWE-918

Server-Side Request Forgery (SSRF)