A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-04-16T00:00:15.637Z

Updated: 2024-08-01T19:03:38.832Z

Reserved: 2024-03-01T14:43:51.962Z

Link: CVE-2024-2083

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:38.832Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-16T00:15:11.057

Modified: 2024-04-16T13:24:07.103

Link: CVE-2024-2083

cve-icon Redhat

No data.