CVE-2024-9340

A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthenticated attackers to cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart boundaries. This flaw in the multipart request boundary processing mechanism leads to an infinite loop, resulting in a complete denial of service for all users. Affected endpoints include `/api/v1/login` and `/api/v1/device_authorization`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*

History

15 Jul 2025, 11:15

Type Values Removed Values Added
CWE CWE-400 CWE-835
First Time Zenml zenml
Zenml
CPE cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
References () https://github.com/zenml-io/zenml/commit/cba152eb9ca3071c8372b0b91c02d9d3351de48d - () https://github.com/zenml-io/zenml/commit/cba152eb9ca3071c8372b0b91c02d9d3351de48d - Patch
References () https://huntr.com/bounties/c9200654-7dc0-4c1d-8573-ab79a87fb4f6 - () https://huntr.com/bounties/c9200654-7dc0-4c1d-8573-ab79a87fb4f6 - Exploit, Third Party Advisory
Summary
  • (es) Una vulnerabilidad de denegación de servicio (DoS) en zenml-io/zenml versión 0.66.0 permite a atacantes no autenticados consumir recursos excesivamente mediante el envío de solicitudes multiparte malformadas con caracteres arbitrarios añadidos al final de los límites. Esta falla en el mecanismo de procesamiento de los límites de solicitudes multiparte genera un bucle infinito, lo que resulta en una denegación de servicio completa para todos los usuarios. Los endpoints afectados incluyen `/api/v1/login` y `/api/v1/device_authorization`.

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-15 11:15


NVD link : CVE-2024-9340

Mitre link : CVE-2024-9340

CVE.ORG link : CVE-2024-9340


JSON object : View

Products Affected

zenml

  • zenml
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')