Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table fields.
References
Link | Resource |
---|---|
https://github.com/mlflow/mlflow/pull/10893 | Issue Tracking Patch |
https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ | Exploit Third Party Advisory |
https://github.com/mlflow/mlflow/pull/10893 | Issue Tracking Patch |
https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ | Exploit Third Party Advisory |
Configurations
History
22 Jan 2025, 13:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* | |
First Time |
Lfprojects mlflow
Lfprojects |
|
References | () https://github.com/mlflow/mlflow/pull/10893 - Issue Tracking, Patch | |
References | () https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ - Exploit, Third Party Advisory |
Information
Published : 2024-02-23 22:15
Updated : 2025-01-22 13:46
NVD link : CVE-2024-27133
Mitre link : CVE-2024-27133
CVE.ORG link : CVE-2024-27133
JSON object : View
Products Affected
lfprojects
- mlflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')