MLflow Default Credentials

critical Web App Scanning Plugin ID 114323

Synopsis

MLflow Default Credentials

Description

By default, MLflow does not require authentication to access the application. When enabling authentication, MLflow will enforce a basic authentication with default credentials. If not updated, a remote and unauthenticated attacker could access the MLflow UI and peform arbitrary actions on it. This detection is included in the AI and LLM category.

Solution

The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.

See Also

https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html

https://en.wikipedia.org/wiki/Password_strength

https://mlflow.org/docs/latest/auth/index.html

Plugin Details

Severity: Critical

ID: 114323

Type: remote

Published: 6/26/2024

Updated: 6/26/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Critical

Base Score: 10

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CVSS Score Source: Tenable

Vulnerability Information

CPE: cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Reference Information