A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the 'redirect' parameter. Consequently, an attacker can execute arbitrary JavaScript code in the context of the user's browser session. This vulnerability could be exploited to steal cookies, potentially leading to account takeover.
Metrics
Affected Vendors & Products
References
History
Tue, 20 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zenml
Zenml zenml |
|
CPEs | cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zenml
Zenml zenml |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-30T15:14:25.313Z
Updated: 2024-08-01T21:03:10.618Z
Reserved: 2024-05-17T12:00:48.633Z
Link: CVE-2024-5062
Vulnrichment
Updated: 2024-08-01T21:03:10.618Z
NVD
Status : Modified
Published: 2024-06-30T16:15:03.217
Modified: 2024-11-21T09:46:53.077
Link: CVE-2024-5062
Redhat
No data.