mlflow@1.16.0 vulnerabilities

MLflow is an open source platform for the complete machine learning lifecycle

Direct Vulnerabilities

Known vulnerabilities in the mlflow package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Missing Input Length Validation

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Missing Input Length Validation in the experiment_name - passed to the run_name() function - and artifact_location parameters. An attacker can cause the UI panel to become unresponsive by passing in an experiment name including a large number of integers.

How to fix Missing Input Length Validation?

There is no fixed version for mlflow.

[0,)
  • H
Allocation of Resources Without Limits or Throttling

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in handlers.py, which is exploitable over the /graphql endpoint. An attacker can occupy all available workers and make the server unresponsive to other connections by sending large batches of GraphQL queries that repeatedly request all runs from a given experiment and stay in a pending state. Experiments configured to have a large number of runs are vulnerable.

How to fix Allocation of Resources Without Limits or Throttling?

There is no fixed version for mlflow.

[0,)
  • M
Weak Password Requirements

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Weak Password Requirements due to the lack of enforcement on password creation during new user account setup. An attacker can gain unauthorized access to the system by exploiting accounts created without passwords.

How to fix Weak Password Requirements?

Upgrade mlflow to version 2.19.0rc0 or higher.

[,2.19.0rc0)
  • M
Cross-site Request Forgery (CSRF)

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) through the Signup feature. An attacker can create a new account, which may be used to perform unauthorized actions on behalf of the malicious user.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade mlflow to version 2.20.2 or higher.

[,2.20.2)
  • H
Relative Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Relative Path Traversal in the _validate_non_local_source_contains_relative_paths() function. An application is vulnerable when the dbfs service is configured and mounted to a local directory rather than Databricks. An attacker can read arbitrary files by manipulating the URL used in the file: protocol, which fails to properly sanitize input beyond the path, such as query and parameters.

How to fix Relative Path Traversal?

Upgrade mlflow to version 2.17.0rc0 or higher.

[,2.17.0rc0)
  • H
Time-of-check Time-of-use (TOCTOU) Race Condition

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition due to excessive directory permissions when the spark_udf() MLflow API is called. An attacker can gain elevated permissions by exploiting this vulnerability.

How to fix Time-of-check Time-of-use (TOCTOU) Race Condition?

Upgrade mlflow to version 2.16.0 or higher.

[,2.16.0)
  • H
Arbitrary Code Injection

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Arbitrary Code Injection due to the autologin method that allows injection of the MLflow callback into the user's callback list. This can lead to failures of predict_stream, ainvoke, astream, and abatch calls when configurations are specified.

How to fix Arbitrary Code Injection?

Upgrade mlflow to version 2.15.0 or higher.

[,2.15.0)
  • M
Undefined Behavior

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Undefined Behavior due to inadequate validation of model names. An attacker can disrupt service or poison data models by creating multiple entries under the same name, exploiting URL encoding differences.

How to fix Undefined Behavior?

Upgrade mlflow to version 2.11.3 or higher.

[,2.11.3)
  • H
Improper Access Control

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Access Control through the URI fragment parsing process. An attacker can read arbitrary files on the local file system by manipulating the fragment part of the URI to include directory traversal sequences such as ../.

How to fix Improper Access Control?

Upgrade mlflow to version 2.11.3 or higher.

[,2.11.3)
  • C
Remote Code Execution (RCE)

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to improper neutralization of special elements within the mlflow.data.http_dataset_source.py module. An attacker can execute arbitrary code by manipulating the filename in the Content-Disposition header or the URL path to include malicious input.

How to fix Remote Code Execution (RCE)?

Upgrade mlflow to version 2.9.0 or higher.

[,2.9.0)
  • H
Deserialization of Untrusted Data

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the _load_model function in the mlflow/pytorch/__init__.py file. An attacker can execute arbitrary code on the victim's system by injecting a malicious pickle object into a PyFunc model which will then be deserialized when the model is loaded.

How to fix Deserialization of Untrusted Data?

There is no fixed version for mlflow.

[0.5.0,)
  • H
Improper Control of Generation of Code ('Code Injection')

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') via the _run_entry_point function in the projects/backend/local.py file. An attacker can execute arbitrary code on the victim's system by submitting a maliciously crafted MLproject file.

How to fix Improper Control of Generation of Code ('Code Injection')?

There is no fixed version for mlflow.

[1.11.0,)
  • H
Deserialization of Untrusted Data

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the _load_model_from_local_file function in the sklearn/__init__.py file. An attacker can execute arbitrary code on the victim's system by injecting a malicious pickle object into a PyFunc model, which will then be deserialized when the model is loaded.

How to fix Deserialization of Untrusted Data?

There is no fixed version for mlflow.

[1.1.0,)
  • H
Deserialization of Untrusted Data

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the _load_pyfunc function in the mlflow/pyfunc/model.py file. An attacker can execute arbitrary code on the victim's system by injecting a malicious pickle object into a PyFunc model which will then be deserialized when the model is loaded.

How to fix Deserialization of Untrusted Data?

There is no fixed version for mlflow.

[0.9.0,)
  • H
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal during the handling of artifact URLs. An attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by constructing a URL that uses the fragment portion to bypass validation and access the filesystem path.

Note:

This vulnerability is a bypass for CVE-2023-6909

How to fix Path Traversal?

Upgrade mlflow to version 2.11.2, 2.12.1 or higher.

[,2.11.2)[2.12.0,2.12.1)
  • M
Improper Access Control

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Access Control due to improper validation for DELETE requests for EDIT user permission. A low privilege attacker can delete artefacts without permission.

How to fix Improper Access Control?

Upgrade mlflow to version 2.12.1 or higher.

[,2.12.1)
  • H
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal due to improper validation of the source parameter within the _create_model_version function. An attacker can gain arbitrary file read access on the server by crafting a source parameter that bypasses the _validate_non_local_source_contains_relative_paths(source) function's checks. This issue stems from the handling of unquoted URL characters and the misuse of the original source value for model version creation, leading to the exposure of sensitive files when interacting with the /model-versions/get-artifact handler.

How to fix Path Traversal?

Upgrade mlflow to version 2.12.1 or higher.

[,2.12.1)
  • H
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal due to improper sanitization of user-supplied paths in the artifact deletion functionality. An attacker can delete arbitrary directories on the server's filesystem by exploiting the double decoding process in the _delete_artifact_mlflow_artifacts handler and local_file_uri_to_path function. This vulnerability arises from an additional unquote operation in the delete_artifacts function of local_artifact_repo.py, which fails to adequately prevent path traversal sequences.

How to fix Path Traversal?

There is no fixed version for mlflow.

[0,)
  • H
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal due to insufficient validation of user-supplied input in the server's handlers. An attacker can access arbitrary files on the server by crafting a series of HTTP POST requests with specially crafted artifact_location and source parameters, using a local URI with the # component.

Note:

This vulnerability is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect.

How to fix Path Traversal?

Upgrade mlflow to version 2.11.3 or higher.

[,2.11.3)
  • H
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal due to improper handling of URL parameters. By smuggling path traversal sequences using the ; character in URLs, attackers can manipulate the params portion of the URL to gain unauthorized access to files or directories.

How to fix Path Traversal?

Upgrade mlflow to version 2.11.3 or higher.

[,2.11.3)
  • H
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal due to the handling of the artifact_location parameter when creating an experiment. An attacker can read arbitrary files on the server in the context of the server's process by using a fragment component # in the artifact location URI.

Note:

This vulnerability is similar to CVE-2023-6909 but utilizes a different component of the URI to achieve the same effect.

How to fix Path Traversal?

Upgrade mlflow to version 2.11.3, 2.12.1 or higher.

[,2.11.3)[2.12.0,2.12.1)
  • C
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the is_local_uri function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.

How to fix Path Traversal?

Upgrade mlflow to version 2.10.0 or higher.

[,2.10.0)
  • M
Cross-site Scripting (XSS)

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in some dataframe fields. An attacker can execute code by convincing a user to run a recipe in a Jupyter Notebook with a malicious dataset.

How to fix Cross-site Scripting (XSS)?

Upgrade mlflow to version 2.10.0 or higher.

[,2.10.0)
  • H
Arbitrary Code Injection

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Arbitrary Code Injection via the __init__.py file. An attacker can inject malicious templates leading to a Remote Code Execution.

How to fix Arbitrary Code Injection?

Upgrade mlflow to version 2.10.0 or higher.

[,2.10.0)
  • C
Improper Access Control

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Access Control via a specially crafted path input that exploits improper neutralization of special elements through the FTP model. An attacker can gain unauthorized read or write access to files on the server by submitting a path with directory traversal sequences.

How to fix Improper Access Control?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • H
Directory Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Directory Traversal allowing arbitrary file writes on the server, by including a # in pathname to bypass the validate_path_is_safe() check.

How to fix Directory Traversal?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • H
Arbitrary File Read

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Arbitrary File Read due to a bypass of the fix for CVE-2023-2780. This allows attackers to trick the is_local_uri() function into downloading arbitrary files unrelated to MLflow from the host server, including any files stored in remote locations to which the host server has access.

How to fix Arbitrary File Read?

Upgrade mlflow to version 2.10.0 or higher.

[,2.10.0)
  • H
Server-Side Request Forgery (SSRF)

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) by exploiting the redirect behavior of the default HTTP protocol inside an http or runs: wrapper. An attacker can access internal resources and achieve arbitrary file writes by triggering the _download_file() function in HttpArtifactRepository.

How to fix Server-Side Request Forgery (SSRF)?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • H
Command Injection

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Command Injection because of an invalid fix for CVE-2023-6709. Attackers can gain full command execution on the victim system, with only one user interaction.

How to fix Command Injection?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • H
Directory Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Directory Traversal when processing of a specially crafted file path that includes directory traversal sequences (..\). An attacker can read files outside of the restricted directory by submitting a crafted file path that exploits inadequate path sanitization.

How to fix Directory Traversal?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • H
Directory Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Directory Traversal when passing crafted input to the file handling mechanism. It is possible to bypass the validate_path_is_safe function check by URL encoding (%2E%2E).

Note:

An attacker can remove any file on the victim server (depending on user's rights) by exploiting this vulnerability.

How to fix Directory Traversal?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • H
Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Path Traversal by loading datasets on Windows. Exploiting this vulnerability is possible when the filename is controlled by the path of the URL on Windows then, it is possible to write files outside of the current working directory using backslash '' instead of front slash '/' as posixpath.basename does not work with Windows paths.

How to fix Path Traversal?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • C
Improper Neutralization of Special Elements Used in a Template Engine

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Neutralization of Special Elements Used in a Template Engine. An attacker can execute arbitrary code or commands by injecting malicious input into the template system.

Note:

In order for this vulnerability to be exploited, the user must load a recipe configuration that he found on the internet.

How to fix Improper Neutralization of Special Elements Used in a Template Engine?

Upgrade mlflow to version 2.9.2 or higher.

[,2.9.2)
  • M
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). An attacker can inject code into the Content-Type header of a POST request, which is then reflected back to the user without proper sanitization or escaping. This can lead to compromising user sessions, stealing sensitive information, or performing other malicious actions on the user's behalf.

How to fix Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')?

Upgrade mlflow to version 2.9.0 or higher.

[,2.9.0)
  • C
OS Command Injection

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to OS Command Injection through a /ajax-api/2.0/mlflow/model-versions/create request. A malicious user could use this issue to get command execution on the vulnerable machine and get access to data and models information.

How to fix OS Command Injection?

Upgrade mlflow to version 2.9.0 or higher.

[,2.9.0)
  • C
Use of GET Request Method With Sensitive Query Strings

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Use of GET Request Method With Sensitive Query Strings due to incomplete fix for CVE-2023-1177. A bypass for in both mlflow server and mlflow ui was discovered to go around MLFlow's implementation of basic authentication.

How to fix Use of GET Request Method With Sensitive Query Strings?

Upgrade mlflow to version 2.8.0 or higher.

[,2.8.0)
  • H
Improper Limitation of a Pathname to a Restricted Directory

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Limitation of a Pathname to a Restricted Directory due to checks bypass in handlers.py. An attacker can break out of the root directory on Windows, being able to read or write sensitive data from the host (which can include the SSH key).

Note:

This issue is only exploitable on Windows OS.

How to fix Improper Limitation of a Pathname to a Restricted Directory?

Upgrade mlflow to version 2.8.1 or higher.

[,2.8.1)
  • H
Command Injection

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Command Injection due to not properly escaping the arguments used by the predict() method in the backend.py file.

How to fix Command Injection?

Upgrade mlflow to version 2.6.0 or higher.

[0,2.6.0)
  • H
Directory Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Directory Traversal via the function _validate_non_local_source_contains_relative_paths due to improper validation of the 'source' parameter.

How to fix Directory Traversal?

Upgrade mlflow to version 2.4.1 or higher.

[,2.4.1)
  • C
Arbitrary File Read

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Arbitrary File Read due to a bypass of the fix for CVE-2023-1177. This allows attackers to download arbitrary files unrelated to MLflow from the host server, including any files stored in remote locations to which the host server has access.

How to fix Arbitrary File Read?

Upgrade mlflow to version 2.3.0 or higher.

[,2.3.0)
  • H
Directory Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Directory Traversal due to improper validation of the path parameter in handlers.py.

How to fix Directory Traversal?

Upgrade mlflow to version 2.0.0rc0 or higher.

[,2.0.0rc0)
  • C
Relative Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Relative Path Traversal due to allowing the ability to provide relative paths in registered model sources.

Note:

This issue only affects users and integrations that run the mlflow server and mlflow ui commands. Integrations that do not make use of mlflow server or mlflow ui are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way.

How to fix Relative Path Traversal?

Upgrade mlflow to version 2.3.1 or higher.

[,2.3.1)
  • C
Access Restriction Bypass

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Access Restriction Bypass. Users of the MLflow Open Source Project who are hosting the MLflow Model Registry using the mlflow server or mlflow ui commands may be vulnerable to a remote file access exploit if they are not limiting who can query their server (for example, by using a cloud VPC, an IP allowlist for inbound requests, or authentication / authorization middleware).

This issue only affects users and integrations that run the mlflow server and mlflow ui commands. Integrations that do not make use of mlflow server or mlflow ui are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way. The vulnerability is very similar to CVE-2023-1177

How to fix Access Restriction Bypass?

Upgrade mlflow to version 2.3.1 or higher.

[,2.3.1)
  • H
Relative Path Traversal

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Relative Path Traversal such that by creating a model version through the REST API endpoint api/2.0/mlflow/registered-models/create and specifying a relative path redirection to the source argument, local server files can be accessed on the tracking server when a subsequent REST API v1.1 call is made to model-versions/get-artifact.

How to fix Relative Path Traversal?

Upgrade mlflow to version 2.3.1 or higher.

[,2.3.1)
  • M
Access Restriction Bypass

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Access Restriction Bypass via the mlflow server and mlflow ui CLIs.

How to fix Access Restriction Bypass?

Upgrade mlflow to version 2.2.0 or higher.

[,2.2.0)
  • C
Improper Access Control

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Improper Access Control which enables malicious actors to download arbitrary files unrelated to MLflow from the host server, including any files stored in remote locations to which the host server has access. This issue only affects users and integrations that run the mlflow-server and mlflow-ui commands.

How to fix Improper Access Control?

Upgrade mlflow to version 2.2.1 or higher.

[,2.2.1)
  • H
Insecure Temporary File

mlflow is a platform to streamline machine learning development, including tracking experiments, packaging code into reproducible runs, and sharing and deploying models.

Affected versions of this package are vulnerable to Insecure Temporary File which is using the deprecated function tempfile.mktemp() that is not secure because a different process may create a file with this name in the time between the call to mktemp() and the attempt to create the file.

How to fix Insecure Temporary File?

Upgrade mlflow to version 1.23.1 or higher.

[,1.23.1)