A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-16T00:00:15.637Z
Updated: 2024-08-01T19:03:38.832Z
Reserved: 2024-03-01T14:43:51.962Z
Link: CVE-2024-2083
Vulnrichment
Updated: 2024-08-01T19:03:38.832Z
NVD
Status : Awaiting Analysis
Published: 2024-04-16T00:15:11.057
Modified: 2024-04-16T13:24:07.103
Link: CVE-2024-2083
Redhat
No data.