LF Projects MLflow 2.18.0 Release Candidate 0

CPE Details

LF Projects MLflow 2.18.0 Release Candidate 0
2.18.0
2025-01-22
13h57 +00:00
2025-01-22
13h57 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:lfprojects:mlflow:2.18.0:rc0:*:*:*:*:*:*

Informations

Vendor

lfprojects

Product

mlflow

Version

2.18.0

Update

rc0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-1474 2025-03-20 10h10 +00:00 In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0.
5.5
Medium
CVE-2024-37061 2024-06-04 12h02 +00:00 Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user’s system when run.
8.8
High
CVE-2024-37060 2024-06-04 12h02 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user’s system when run.
8.8
High
CVE-2024-37059 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37058 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37057 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.0.0rc0 or newer, enabling a maliciously uploaded Tensorflow model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37056 2024-06-04 12h01 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.23.0 or newer, enabling a maliciously uploaded LightGBM scikit-learn model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37055 2024-06-04 12h00 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37054 2024-06-04 12h00 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37053 2024-06-04 12h00 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2024-37052 2024-06-04 11h59 +00:00 Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
8.8
High
CVE-2023-6014 2023-11-16 21h07 +00:00 An attacker is able to arbitrarily create an account in MLflow bypassing any authentication requirment.
9.8
Critical