A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1126 Directory traversal in zenml
Github GHSA Github GHSA GHSA-6h3f-43vq-53hj Directory traversal in zenml
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00205}

epss

{'score': 0.00278}


Mon, 12 May 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenml
Zenml zenml
CPEs cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
Vendors & Products Zenml
Zenml zenml
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T19:03:38.832Z

Reserved: 2024-03-01T14:43:51.962Z

Link: CVE-2024-2083

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:38.832Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-16T00:15:11.057

Modified: 2025-05-12T13:12:08.613

Link: CVE-2024-2083

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.