प्लेटफ़ॉर्म
python
घटक
mlflow
में ठीक किया गया
2.8.1
CVE-2023-6015 describes a critical Arbitrary File Access vulnerability present in MLflow versions up to 2.8.0. This flaw allows attackers to upload arbitrary files to the MLflow server, posing a significant risk to data integrity and system security. The vulnerability has been resolved in version 2.8.1, and users are strongly advised to upgrade immediately.
The Arbitrary File Access vulnerability in MLflow allows an attacker to upload any file they choose to the MLflow server. This could be exploited to upload malicious code, such as a web shell, which would grant the attacker remote code execution capabilities. Alternatively, attackers could overwrite critical configuration files, disrupting MLflow's functionality or gaining access to sensitive data stored within the system. The potential impact extends beyond the MLflow instance itself, as a compromised server could be used as a pivot point for lateral movement within the network, potentially affecting other connected systems and data stores. The ability to upload arbitrary files bypasses standard security controls and represents a severe compromise of the system's integrity.
CVE-2023-6015 was publicly disclosed on November 16, 2023. While no active exploitation campaigns have been publicly confirmed, the CRITICAL severity and ease of exploitation make it a high-priority vulnerability. There are currently no known public proof-of-concept exploits, but the vulnerability's nature suggests that such exploits are likely to emerge. This vulnerability is not currently listed on the CISA KEV catalog.
Organizations using MLflow for machine learning model tracking and management are at risk, particularly those running versions 2.8.0 or earlier. Environments with limited network segmentation or inadequate access controls are especially vulnerable, as a successful exploit could provide a foothold for broader network compromise. Teams relying on MLflow for sensitive data storage or model deployment should prioritize remediation.
• python / mlflow:
import mlflow
import requests
# Attempt to upload a file with a malicious filename
url = mlflow.tracking.MlflowClient().tracking_uri + '/data/artifacts/malicious.php' # Adjust URL as needed
files = {'file': open('malicious.php', 'rb')} # Replace with a test malicious file
response = requests.put(url, files=files)
print(response.status_code)• generic web:
curl -X PUT -F "[email protected]" <mlflow_tracking_uri>/data/artifacts/malicious.php• generic web: Check MLflow server logs for unusual file upload attempts or errors related to file access.
disclosure
एक्सप्लॉइट स्थिति
EPSS
0.77% (73% शतमक)
CVSS वेक्टर
The primary mitigation for CVE-2023-6015 is to upgrade MLflow to version 2.8.1 or later, which contains the fix for this vulnerability. If upgrading immediately is not feasible, consider implementing temporary workarounds such as restricting file upload permissions on the MLflow server and closely monitoring file system activity for suspicious uploads. Implement a Web Application Firewall (WAF) with rules to block attempts to upload files to the MLflow API endpoints. Regularly scan the MLflow server for unauthorized files and review access controls to ensure only authorized users can upload files. After upgrading, confirm the fix by attempting a file upload via the MLflow API and verifying that the upload is rejected.
MLflow को नवीनतम उपलब्ध संस्करण में अपडेट करें। यह मनमाना फ़ाइल अपलोड के भेद्यता को ठीक कर देगा। अपडेट के बारे में अधिक जानकारी के लिए रिलीज़ नोट्स देखें।
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2023-6015 is a CRITICAL vulnerability in MLflow versions up to 2.8.0 that allows attackers to upload arbitrary files to the server, potentially leading to code execution or data compromise.
Yes, if you are using MLflow version 2.8.0 or earlier, you are affected by this vulnerability.
Upgrade MLflow to version 2.8.1 or later to remediate the vulnerability. Consider temporary workarounds like restricting file upload permissions if immediate upgrade is not possible.
While no active exploitation campaigns have been publicly confirmed, the CRITICAL severity and ease of exploitation make it a high-priority vulnerability.
Refer to the MLflow security advisory for detailed information and updates: [https://mlflow.org/docs/security](https://mlflow.org/docs/security)
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
अपनी requirements.txt फ़ाइल अपलोड करें और तुरंत जानें कि आप प्रभावित हैं या नहीं।