CVE-2023-43472

An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:24

Type Values Removed Values Added
References () https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-language-model-security-contrast-security - Exploit, Press/Media Coverage () https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-language-model-security-contrast-security - Exploit, Press/Media Coverage

11 Dec 2023, 15:32

Type Values Removed Values Added
References () https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-language-model-security-contrast-security - () https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-language-model-security-contrast-security - Exploit, Press/Media Coverage
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE NVD-CWE-noinfo
First Time Lfprojects mlflow
Lfprojects
CPE cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

05 Dec 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-05 07:15

Updated : 2024-11-21 08:24


NVD link : CVE-2023-43472

Mitre link : CVE-2023-43472

CVE.ORG link : CVE-2023-43472


JSON object : View

Products Affected

lfprojects

  • mlflow