Potential Account Takeover in ZenML due to Rate-Limiting Flaw
CVE-2024-4311

Currently unrated

Key Information:

Vendor

zenml-io

Status
Vendor
CVE Published:
14 November 2024

What is CVE-2024-4311?

ZenML version 0.56.4 has a vulnerability that exposes users to account takeover risks because of insufficient rate-limiting controls in the password change functionality. Specifically, the '/api/v1/current-user' endpoint lacks restrictions on the number of password attempts, allowing attackers to brute-force the current password. If the vulnerability is exploited, the attacker can change the account password and gain unauthorized control over user accounts, posing a significant threat to account integrity and user data security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

Timeline

  • Vulnerability published

.