Skip to content

ZenML Server Remote Privilege Escalation Vulnerability

Moderate severity GitHub Reviewed Published Feb 27, 2024 to the GitHub Advisory Database • Updated Aug 2, 2024

Package

pip zenml (pip)

Affected versions

< 0.42.2
= 0.43.0
>= 0.45.0, < 0.46.7
>= 0.44.0, < 0.44.4

Patched versions

0.42.2
0.43.1
0.46.7
0.44.4

Description

ZenML Server in the ZenML package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.

References

Published by the National Vulnerability Database Feb 27, 2024
Published to the GitHub Advisory Database Feb 27, 2024
Reviewed Feb 27, 2024
Last updated Aug 2, 2024

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS score

0.749%
(81st percentile)

Weaknesses

CVE ID

CVE-2024-25723

GHSA ID

GHSA-vf7j-cmrj-pmmm

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.