Directory Traversal Vulnerability in zenml Repository
CVE-2024-2083
What is CVE-2024-2083?
A directory traversal vulnerability has been identified in ZenML, specifically within the /api/v1/steps endpoint. This flaw allows attackers to manipulate the 'logs' URI path within requests to access arbitrary files on the server, circumventing established access control mechanisms. The underlying issue stems from the lack of adequate validation for directory traversal patterns in incoming requests, which may lead to unauthorized access to files outside the designated directory. This vulnerability poses significant security risks, allowing malicious users to exploit the API and potentially access sensitive information.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
zenml-io/zenml < 0.55.5
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
