Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: pkgsRocm.python3Packages.mlflow

Found 1 matching suggestions

View:
Compact
Detailed
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • pkgsRocm.python3Packages.sagemaker-mlflow
    • python314Packages.sagemaker-mlflow
    • python313Packages.sagemaker-mlflow
    • python312Packages.sagemaker-mlflow
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
MLflow Use of Default Password Authentication Bypass Vulnerability

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the administrator. Was ZDI-CAN-28256.

References

Affected products

MLflow
  • ==3.4.0

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Upstream PR: https://github.com/mlflow/mlflow/pull/19260
ZDI advisory: https://www.zerodayinitiative.com/advisories/ZDI-26-111/