with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://huntr.com/bounties/c6f59480-ce47-4f78-a3dc-4bd8ca15029c | third party advisory |
https://github.com/mlflow/mlflow/commit/5139b1087d686fa52e2b087e09da66aff86297b1 | patch |