Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. zenml
  4. ›
  5. CVE-2024-4311

CVE-2024-4311: Missing ratelimit on passwrod resets in zenml

November 14, 2024 (updated November 18, 2024)

zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the ‘Update Password’ function, allowing them to take over the user’s account. This vulnerability is due to the absence of rate-limiting on the ‘/api/v1/current-user’ endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.

References

  • github.com/advisories/GHSA-j3vq-pmp5-r5xj
  • github.com/zenml-io/zenml
  • github.com/zenml-io/zenml/commit/87a6c2c8f45b49ea83fbb5fe8fff7ab5365a60c9
  • huntr.com/bounties/d5517e1a-6b94-4e38-aad6-3aa65f98bec2
  • nvd.nist.gov/vuln/detail/CVE-2024-4311

Code Behaviors & Features

Detect and mitigate CVE-2024-4311 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.57.0rc2

Fixed versions

  • 0.57.0rc2

Solution

Upgrade to version 0.57.0rc2 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

pypi/zenml/CVE-2024-4311.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.