Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-27134
PUBLISHED
More InfoOfficial Page
Assigner-JFROG
Assigner Org ID-48a46f29-ae42-4e1d-90dd-c1676c1e5e6d
View Known Exploited Vulnerability (KEV) details
Published At-25 Nov, 2024 | 13:48
Updated At-25 Nov, 2024 | 14:23
Rejected At-
▼CVE Numbering Authority (CNA)
Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf

Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_udf() MLflow API is called.

Affected Products
Collection URL
https://pypi.python.org
Package Name
mlflow
Default Status
unaffected
Versions
Affected
  • From 0 before 2.16.0 (python)
Problem Types
TypeCWE IDDescription
CWECWE-367CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
CWECWE-276CWE-276 Incorrect Default Permissions
Metrics
VersionBase scoreBase severityVector
3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/mlflow/mlflow/pull/10874
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
lfprojects
Product
mlflow
CPEs
  • cpe:2.3:a:lfprojects:mlflow:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 2.16.0 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found