An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. This vulnerability allows for unauthorized account takeover by bypassing the standard password change verification process. The issue was fixed in version 0.56.3.
References
Link | Resource |
---|---|
https://github.com/zenml-io/zenml/commit/58cb3d987372c91eb605853c35325701733337c2 | Patch |
https://huntr.com/bounties/8f5534ac-fd08-4b8b-8c2e-35949aa36e48 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/zenml-io/zenml/commit/58cb3d987372c91eb605853c35325701733337c2 | Patch |
https://huntr.com/bounties/8f5534ac-fd08-4b8b-8c2e-35949aa36e48 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-06-06 19:15
Updated : 2024-11-21 09:09
NVD link : CVE-2024-2213
Mitre link : CVE-2024-2213
CVE.ORG link : CVE-2024-2213
JSON object : View
Products Affected
zenml
- zenml
CWE