Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe.
This issue leads to a client-side RCE when running an untrusted recipe in Jupyter Notebook.
The vulnerability stems from lack of sanitization over template variables.
References
Link | Resource |
---|---|
https://github.com/mlflow/mlflow/pull/10873 | Issue Tracking Patch |
https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ | Exploit Third Party Advisory |
https://github.com/mlflow/mlflow/pull/10873 | Issue Tracking Patch |
https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ | Exploit Third Party Advisory |
Configurations
History
22 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* | |
References | () https://github.com/mlflow/mlflow/pull/10873 - Issue Tracking, Patch | |
References | () https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ - Exploit, Third Party Advisory | |
First Time |
Lfprojects mlflow
Lfprojects |
Information
Published : 2024-02-23 22:15
Updated : 2025-01-22 14:15
NVD link : CVE-2024-27132
Mitre link : CVE-2024-27132
CVE.ORG link : CVE-2024-27132
JSON object : View
Products Affected
lfprojects
- mlflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')