Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe.
This issue leads to a client-side RCE when running an untrusted recipe in Jupyter Notebook.
The vulnerability stems from lack of sanitization over template variables.
References
| Link | Resource |
|---|---|
| https://github.com/mlflow/mlflow/pull/10873 | Issue Tracking Patch |
| https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ | Exploit Third Party Advisory |
| https://github.com/mlflow/mlflow/pull/10873 | Issue Tracking Patch |
| https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-23 22:15
Updated : 2025-01-22 14:15
NVD link : CVE-2024-27132
Mitre link : CVE-2024-27132
CVE.ORG link : CVE-2024-27132
JSON object : View
Products Affected
lfprojects
- mlflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
