A malicious user could use this issue to access internal HTTP(s) servers and in the worst case (ie: aws instance) it could be abuse to get a remote code execution on the victim machine.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
lfprojects mlflow |