Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:47428
HistoryJun 10, 2024 - 4:44 a.m.

Deserialization Of Untrusted Data

2024-06-1004:44:10
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
mlflow
vulnerability
`_load_from_pickle`
arbitrary code execution
langchain agentexecutor model

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

mlflow is vulnerable to Deserialization of Untrusted Data. The vulnerability is caused by a lack of validation in the _load_from_pickle function in the mlflow/langchain/utils.py file, allowing an attacker to execute arbitrary code on the victim’s system through a malicious Langchain AgentExecutor model.

CPENameOperatorVersion
mlflowle2.14.0rc0
mlflowle2.14.0rc0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%