Today > vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-4311

Nov. 18, 2024, 4:35 p.m.

CVSS Score

5.4 / 10

Product(s) Impacted

zenml-io/zenml

  • 0.56.4

Description

zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.

Weaknesses

CWE-770
Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

CWE ID: 770

Date

Published: Nov. 14, 2024, 6:15 p.m.

Last Modified: Nov. 18, 2024, 4:35 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security@huntr.dev

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

Base Score
5.4
Exploitability Score
1.2
Impact Score
4.2
Base Severity
MEDIUM
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H

References

https://github.com/ security@huntr.dev

https://huntr.com/ security@huntr.dev