A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml repository, specifically within the 'logo_url' field. By injecting malicious payloads into this field, an attacker could send harmful messages to other users, potentially compromising their accounts. The vulnerability affects version 0.55.3 and was fixed in version 0.56.2. The impact of exploiting this vulnerability could lead to user account compromise.
References
Link | Resource |
---|---|
https://github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945e | Patch |
https://huntr.com/bounties/cee06a28-7e3b-460b-b504-69add838ebe8 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945e | Patch |
https://huntr.com/bounties/cee06a28-7e3b-460b-b504-69add838ebe8 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-06-06 19:15
Updated : 2024-11-21 09:09
NVD link : CVE-2024-2171
Mitre link : CVE-2024-2171
CVE.ORG link : CVE-2024-2171
JSON object : View
Products Affected
zenml
- zenml
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')