An improper authorization vulnerability exists in the zenml-io/zenml repository, specifically within the API PUT /api/v1/users/id endpoint. This vulnerability allows any authenticated user to modify the information of other users, including changing the `active` status of user accounts to false, effectively deactivating them. This issue affects version 0.55.3 and was fixed in version 0.56.2. The impact of this vulnerability is significant as it allows for the deactivation of admin accounts, potentially disrupting the functionality and security of the application.
History

Fri, 11 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Zenml
Zenml zenml
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
Vendors & Products Zenml
Zenml zenml
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-06T18:25:00.141Z

Updated: 2024-08-01T18:56:22.835Z

Reserved: 2024-02-29T19:50:35.229Z

Link: CVE-2024-2035

cve-icon Vulnrichment

Updated: 2024-08-01T18:56:22.835Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-06T19:15:53.313

Modified: 2024-10-11T14:20:05.590

Link: CVE-2024-2035

cve-icon Redhat

No data.