CVE-2024-27134 – mlflow
Package
Manager: pip
Name: mlflow
Vulnerable Version: >=0 <2.16.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00017 pctl0.02414
Details
MLflow's excessive directory permissions allow local privilege escalation Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_udf() MLflow API is called.
Metadata
Created: 2024-11-25T18:33:26Z
Modified: 2024-11-25T19:41:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-qpgc-w4mg-6v92/GHSA-qpgc-w4mg-6v92.json
CWE IDs: ["CWE-276"]
Alternative ID: GHSA-qpgc-w4mg-6v92
Finding: F159
Auto approve: 1