A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1126 | Directory traversal in zenml |
Github GHSA |
GHSA-6h3f-43vq-53hj | Directory traversal in zenml |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 12 May 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenml
Zenml zenml |
|
| CPEs | cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zenml
Zenml zenml |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T19:03:38.832Z
Reserved: 2024-03-01T14:43:51.962Z
Link: CVE-2024-2083
Updated: 2024-08-01T19:03:38.832Z
Status : Analyzed
Published: 2024-04-16T00:15:11.057
Modified: 2025-05-12T13:12:08.613
Link: CVE-2024-2083
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA