AVID-2026-R1336
Description
Server-Side Request Forgery (SSRF) (CVE-2023-6974)
Details
A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
Reason for inclusion in AVID: This CVE describes an SSRF vulnerability in MLflow (mlflow/mlflow), a component commonly used in AI/ML pipelines for experimentation, deployment, and serving. It affects software used to build and run general-purpose AI systems, and has security implications including potential remote code execution in worst-case scenarios. The CVE entry provides description, CVSS metrics, and references, offering sufficient evidence to classify as an AI-related software supply chain vulnerability in AI stacks.
References
- NVD entry
- https://huntr.com/bounties/438b0524-da0e-4d08-976a-6f270c688393
- https://github.com/mlflow/mlflow/commit/8174250f83352a04c2d42079f414759060458555
Affected or Relevant Artifacts
- Developer: mlflow
- Deployer: mlflow
- Artifact Details:
| Type | Name |
|---|---|
| System | mlflow/mlflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
| Base Score | 8.6 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | CHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | NONE |
| Availability Impact | NONE |
CWE
| ID | Description |
|---|---|
| CWE-918 | CWE-918 Server-Side Request Forgery (SSRF) |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2023-12-20
- Version: 0.3.3
- AVID Entry