Skip to content

ZenML Server Remote Privilege Escalation Vulnerability

Moderate severity GitHub Reviewed Published Feb 27, 2024 to the GitHub Advisory Database • Updated Feb 29, 2024

Package

pip zenml (pip)

Affected versions

< 0.42.2
= 0.43.0
>= 0.45.0, < 0.46.7
>= 0.44.0, < 0.44.4

Patched versions

0.42.2
0.43.1
0.46.7
0.44.4

Description

ZenML Server in the ZenML package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.

References

Published by the National Vulnerability Database Feb 27, 2024
Published to the GitHub Advisory Database Feb 27, 2024
Reviewed Feb 27, 2024
Last updated Feb 29, 2024

Severity

Moderate

Weaknesses

No CWEs

CVE ID

CVE-2024-25723

GHSA ID

GHSA-vf7j-cmrj-pmmm

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.