Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-43472
HistoryJun 07, 2024 - 10:46 a.m.

MLFlow < 2.8.1 - Sensitive Information Disclosure

2024-06-0710:46:45
ProjectDiscovery
github.com
cve
cve2023
mflow
exposure
remot
attacker
sensitive
information
rest
api
vulnerability
upgrade
patched

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

Low

0.012 Low

EPSS

Percentile

85.2%

An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
id: CVE-2023-43472

info:
  name: MLFlow < 2.8.1 - Sensitive Information Disclosure
  author: ritikchaddha
  severity: high
  description: |
    An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
  impact: |
    An attacker can access sensitive information stored in MLFlow.
  remediation: |
    Upgrade MLFlow to a version that has patched CVE-2023-43472.
  reference:
    - https://www.contrastsecurity.com/security-influencers/discovering-mlflow-framework-zero-day-vulnerability-machine-language-model-security-contrast-security
    - https://nvd.nist.gov/vuln/detail/CVE-2023-43472
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-43472
    epss-score: 0.00116
    epss-percentile: 0.45309
    cpe: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    vendor: lfprojects
    product: mlflow
    shodan-query: http.title:"mlflow"
    fofa-query: app="MLflow"
  tags: cve,cve2023,mflow,exposure

http:
  - method: GET
    path:
      - "{{BaseURL}}/api/2.0/preview/mlflow/experiments/list"

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body, "experiment_id\":", "artifact_location\":", "lifecycle_stage\":")'
          - 'contains(header, "application/json")'
          - 'status_code == 200'
        condition: and
# digest: 490a0046304402200604a134f8c6077c7051b019211d1b92cdae8f79ac5b9be070e6c09a53bf039102207d6375965069071d12932be5b11b6762e2396f54e8cc8ce2a051da395a28499e:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

Low

0.012 Low

EPSS

Percentile

85.2%

Related for NUCLEI:CVE-2023-43472