Lfprojects

Mlflow

65 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 07.04.2026 12:57:44
  • Zuletzt bearbeitet 20.04.2026 18:45:16

MLflow is vulnerable to an authorization bypass affecting the AJAX endpoint used to download saved model artifacts. Due to missing access‑control validation, a user without permissions to a given experiment can directly query this endpoint and retrie...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 07.04.2026 12:57:38
  • Zuletzt bearbeitet 20.04.2026 18:44:12

MLflow is vulnerable to Stored Cross-Site Scripting (XSS) caused by unsafe parsing of YAML-based MLmodel artifacts in its web interface. An authenticated attacker can upload a malicious MLmodel file containing a payload that executes when another use...

Exploit
  • EPSS 11.48%
  • Veröffentlicht 03.04.2026 17:03:12
  • Zuletzt bearbeitet 21.04.2026 01:45:33

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is e...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 31.03.2026 14:25:27
  • Zuletzt bearbeitet 14.04.2026 16:01:29

A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains shel...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 30.03.2026 07:16:57
  • Zuletzt bearbeitet 28.04.2026 14:26:00

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specificat...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 30.03.2026 01:16:06
  • Zuletzt bearbeitet 28.04.2026 14:27:19

A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 27.03.2026 16:17:30
  • Zuletzt bearbeitet 28.04.2026 14:32:08

In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 18.03.2026 22:06:47
  • Zuletzt bearbeitet 23.03.2026 17:48:45

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..`...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 15.03.2026 09:27:36
  • Zuletzt bearbeitet 14.04.2026 16:48:14

A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 02.02.2026 10:36:22
  • Zuletzt bearbeitet 14.04.2026 14:57:42

In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with write access to the `/tmp` directory to exploit a race...