by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
4 packages
- pkgsRocm.python3Packages.sagemaker-mlflow
- python314Packages.sagemaker-mlflow
- python313Packages.sagemaker-mlflow
- python312Packages.sagemaker-mlflow
- @LeSuisse accepted
- @LeSuisse published on GitHub
MLflow Use of Default Password Authentication Bypass Vulnerability
MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the administrator. Was ZDI-CAN-28256.
References
- ZDI-26-111 x_research-advisory
- vendor-provided URL vendor-advisory
Affected products
- ==3.4.0
Matching in nixpkgs
pkgs.mlflow-server
Open source platform for the machine learning lifecycle
pkgs.pkgsRocm.mlflow-server
Open source platform for the machine learning lifecycle
pkgs.python312Packages.mlflow
Open source platform for the machine learning lifecycle
pkgs.python313Packages.mlflow
Open source platform for the machine learning lifecycle
pkgs.python314Packages.mlflow
Open source platform for the machine learning lifecycle
Ignored packages (4)
pkgs.python312Packages.sagemaker-mlflow
MLFlow plugin for SageMaker
pkgs.python313Packages.sagemaker-mlflow
MLFlow plugin for SageMaker
pkgs.python314Packages.sagemaker-mlflow
MLFlow plugin for SageMaker
Package maintainers
-
@tbenst Tyler Benster <nix@tylerbenster.com>