zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zenmlio
Zenmlio zenml |
|
CPEs | cpe:2.3:a:zenmlio:zenml:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zenmlio
Zenmlio zenml |
|
Metrics |
cvssV3_1
|
Thu, 14 Nov 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account. | |
Title | Lack of login attempt rate-limiting in zenml-io/zenml | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-11-14T17:35:53.703Z
Updated: 2024-11-18T15:40:16.154Z
Reserved: 2024-04-29T10:35:32.401Z
Link: CVE-2024-4311
Vulnrichment
Updated: 2024-11-18T15:39:23.654Z
NVD
Status : Awaiting Analysis
Published: 2024-11-14T18:15:19.473
Modified: 2024-11-18T16:35:13.737
Link: CVE-2024-4311
Redhat
No data.