LF Projects MLflow 2.17.2

CPE Details

LF Projects MLflow 2.17.2
2.17.2
2025-01-22
13h57 +00:00
2025-01-22
13h57 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:lfprojects:mlflow:2.17.2:*:*:*:*:*:*:*

Informations

Vendor

lfprojects

Product

mlflow

Version

2.17.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-0453 2025-03-20 10h11 +00:00 In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated by MLFlow, rendering the application unable to respond to other requests. This vulnerability is due to uncontrolled resource consumption.
7.5
High
CVE-2025-1474 2025-03-20 10h10 +00:00 In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0.
5.5
Medium
CVE-2024-37061 2024-06-04 12h02 +00:00 Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user’s system when run.
8.8
High
CVE-2024-37060 2024-06-04 12h02 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user’s system when run.
8.8
High
CVE-2024-37059 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37058 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37057 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.0.0rc0 or newer, enabling a maliciously uploaded Tensorflow model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37056 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.23.0 or newer, enabling a maliciously uploaded LightGBM scikit-learn model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37055 2024-06-04 12h00 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37054 2024-06-04 12h00 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37053 2024-06-04 12h00 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37052 2024-06-04 11h59 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2023-6014 2023-11-16 21h07 +00:00 An attacker is able to arbitrarily create an account in MLflow bypassing any authentication requirment.
9.8
Critical