Directory Traversal Vulnerability in zenml Repository
CVE-2024-2083

9.9CRITICAL

Key Information:

Vendor

Zenml-io

Vendor
CVE Published:
16 April 2024

What is CVE-2024-2083?

A directory traversal vulnerability has been identified in ZenML, specifically within the /api/v1/steps endpoint. This flaw allows attackers to manipulate the 'logs' URI path within requests to access arbitrary files on the server, circumventing established access control mechanisms. The underlying issue stems from the lack of adequate validation for directory traversal patterns in incoming requests, which may lead to unauthorized access to files outside the designated directory. This vulnerability poses significant security risks, allowing malicious users to exploit the API and potentially access sensitive information.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

zenml-io/zenml < 0.55.5

References

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.