zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.
History

Mon, 18 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Zenmlio
Zenmlio zenml
CPEs cpe:2.3:a:zenmlio:zenml:*:*:*:*:*:*:*:*
Vendors & Products Zenmlio
Zenmlio zenml
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Nov 2024 17:45:00 +0000

Type Values Removed Values Added
Description zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.
Title Lack of login attempt rate-limiting in zenml-io/zenml
Weaknesses CWE-770
References
Metrics cvssV3_0

{'score': 5.4, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-11-14T17:35:53.703Z

Updated: 2024-11-18T15:40:16.154Z

Reserved: 2024-04-29T10:35:32.401Z

Link: CVE-2024-4311

cve-icon Vulnrichment

Updated: 2024-11-18T15:39:23.654Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-14T18:15:19.473

Modified: 2024-11-18T16:35:13.737

Link: CVE-2024-4311

cve-icon Redhat

No data.