Vulnerability Database
Blog
FAQ
Docs
CVE-2023-6977
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-6977
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-6977.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-6977
Aliases
BIT-mlflow-2023-6977
GHSA-qg8p-32gr-gh6x
Published
2023-12-20T06:15:45Z
Modified
2025-01-15T05:04:54.666482Z
Severity
7.5 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Calculator
Summary
[none]
Details
This vulnerability enables malicious users to read sensitive files on the server.
References
https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf
https://github.com/mlflow/mlflow/commit/4bd7f27c810ba7487d53ed5ef1038fca0f8dc28c
Affected packages
Git
/
github.com/mlflow/mlflow
Affected ranges
Type
GIT
Repo
https://github.com/mlflow/mlflow
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
4bd7f27c810ba7487d53ed5ef1038fca0f8dc28c
Fixed
4bd7f27c810ba7487d53ed5ef1038fca0f8dc28c
Affected versions
1.*
1.0.0
v0.*
v0.2.0
v0.2.1
v0.3.0
v0.4.0
v0.4.1
v0.4.2
v0.5.0
v0.6.0
v0.7
v0.8.0
v0.8.1
v1.*
v1.7.0
v2.*
v2.2.0
CVE-2023-6977 - OSV