-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AI PRP: Request CVE-2023-6014 MLflow Auth Bypasss Vulnerability #427
Comments
Hi @frkngksl , Thank you for picking up this request! Please make sure the following items are completed before the plugin implementation:
|
I sent the PR regarding to the vulnerable configuration to Security Testbeds repository. You can see it here Vulnerability ResearchMLFlow instances below the version 2.8.0 which use MLFlow UI or MLFlow Server have an authentication bypass vulnerability. Normally MLFlow requires authentication for user creation operations who are served under Plugin DesignI tested this vulnerability with the original PoC, which was given by you, on the both vulnerable and fixed environments. In this PoC, it directly sends the new user and password information to the mentioned endpoint above. You can see the responses that were given for the user creation request from this endpoint from both vulnerable and fixed environment. (You can see the incoming response Clearly, I can identify the vulnerability from the response by searching the string |
Hi @frkngksl , Thank you for providing the detailed plugin design and submitting to Security Testbeds repo. Everything looks good. Please submit our participation form and you can start working on the development. |
Also, I can help you for another AI PRP, but should I wait for this one to be completed? |
It would be great if you could wait for this one to be resolved! Shouldn't take too long now. |
Hi @frkngksl , Your PR has been merged. This usually means a reward will be granted. Google will start the internal QC process and the reward amount will be determined based on the quality of the detector report. Please be patient and allow up to a week for the QC process to finish. You'll be notified once the decision is made. Thanks! |
@frkngksl Thanks for the contribution, your reward has been granted. |
CVE-2023-6014: https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4/
Please read the rules of engagement first at #409.
The text was updated successfully, but these errors were encountered: