CVE-2024-2083

A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*

History

12 May 2025, 13:12

Type Values Removed Values Added
CPE cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
First Time Zenml zenml
Zenml
References () https://github.com/zenml-io/zenml/commit/00e934f33a243a554f5f65b80eefd5ea5117367b - () https://github.com/zenml-io/zenml/commit/00e934f33a243a554f5f65b80eefd5ea5117367b - Third Party Advisory, Patch
References () https://huntr.com/bounties/f24b2216-6a4b-42a1-becb-9b47e6cf117f - () https://huntr.com/bounties/f24b2216-6a4b-42a1-becb-9b47e6cf117f - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2024-04-16 00:15

Updated : 2025-05-12 13:12


NVD link : CVE-2024-2083

Mitre link : CVE-2024-2083

CVE.ORG link : CVE-2024-2083


JSON object : View

Products Affected

zenml

  • zenml
CWE
CWE-29

Path Traversal: '\..\filename'