CVE-2024-37056: MLFlow unsafe deserialization
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42294%
CWE
Published
6/4/2024
Updated
6/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mlflow | pip | >= 1.23.0, <= 2.14.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability specifically references unsafe deserialization in LightGBM scikit-learn model loading. The HiddenLayer advisory explicitly identifies the _load_model function in mlflow/lightgbm/init.py as the vulnerable component, where cloudpickle.load() is used to deserialize models without proper validation. This matches the CWE-502 pattern of untrusted deserialization, and the code snippet provided in the advisory confirms the insecure loading mechanism for scikit-learn flavored LightGBM models.