
Cloud Vulnerability DB
A community-led vulnerabilities database
In mlflow/mlflow version v2.13.2, a vulnerability exists that allows the creation or renaming of an experiment with a large number of integers in its name due to the lack of a limit on the experiment name. Additionally, there is no character limit in the artifact_location
parameter while creating the experiment (NVD).
The vulnerability stems from two main issues: first, the absence of a limit on experiment names when creating or renaming experiments, particularly when using large numbers of integers; second, the unlimited character length in the artifact_location
parameter during experiment creation. The vulnerability has been assigned a CVSS 3.0 base score of 5.3 (MEDIUM) with the vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L (Huntr).
The primary impact of this vulnerability is that it can cause the MLflow UI panel to become unresponsive, leading to a potential denial of service condition. This has been classified as CWE-400 (Uncontrolled Resource Consumption) (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."