
Cloud Vulnerability DB
A community-led vulnerabilities database
Improper Neutralization of Special Elements Used in a Template Engine was discovered in GitHub repository mlflow/mlflow prior to version 2.9.2. The vulnerability, identified as CVE-2023-6709, was assigned a critical severity rating with a CVSS v3.1 base score of 8.8 (HIGH) according to NVD, while huntr.dev assessed it with a CVSS v3.0 score of 10.0 (CRITICAL) (NVD, SecurityWeek).
The vulnerability is classified under CWE-1336 (Improper Neutralization of Special Elements Used in a Template Engine). The issue could lead to remote code execution when loading a malicious recipe configuration. The vulnerability was addressed by implementing SandboxedEnvironment when rendering cards, as evidenced by the patch commit (GitHub Patch).
The vulnerability could potentially lead to remote code execution on affected systems when loading a malicious recipe configuration. This represents a critical security risk for organizations using MLflow versions prior to 2.9.2 (SecurityWeek).
The vulnerability has been patched in MLflow version 2.9.2. Organizations using affected versions should upgrade to version 2.9.2 or later to mitigate this security risk (SecurityWeek).
The vulnerability was discovered through the Huntr bug bounty platform for AI and ML, highlighting the increasing focus on security in AI/ML platforms. It was one of several critical vulnerabilities found in popular AI/ML solutions, drawing attention to the importance of security in machine learning development platforms (SecurityWeek).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."