with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
References:- https://nvd.nist.gov/vuln/detail/CVE-2023-6940
- https://github.com/mlflow/mlflow/commit/5139b1087d686fa52e2b087e09da66aff86297b1
- https://huntr.com/bounties/c6f59480-ce47-4f78-a3dc-4bd8ca15029c
- https://github.com/mlflow/mlflow/pull/10676
- https://github.com/mlflow/mlflow/commit/a98a341a7222f894b7735db575ad9311ecaba4e3
- https://github.com/mlflow/mlflow/commits/v2.9.2
- https://github.com/advisories/GHSA-hvc6-42vf-jhf8