Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. This issue leads to a client-side RCE when running the recipe in Jupyter Notebook. The vulnerability stems from lack of sanitization over dataset table fields.
References
| Link | Resource |
|---|---|
| https://github.com/mlflow/mlflow/pull/10893 | Issue Tracking Patch |
| https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ | Exploit Third Party Advisory |
| https://github.com/mlflow/mlflow/pull/10893 | Issue Tracking Patch |
| https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-23 22:15
Updated : 2025-01-22 13:46
NVD link : CVE-2024-27133
Mitre link : CVE-2024-27133
CVE.ORG link : CVE-2024-27133
JSON object : View
Products Affected
lfprojects
- mlflow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
