Skip to content

ZenML Server Remote Privilege Escalation Vulnerability

Moderate severity GitHub Reviewed Published Feb 27, 2024 to the GitHub Advisory Database • Updated Aug 2, 2024

Package

pip zenml (pip)

Affected versions

< 0.42.2
= 0.43.0
>= 0.45.0, < 0.46.7
>= 0.44.0, < 0.44.4

Patched versions

0.42.2
0.43.1
0.46.7
0.44.4

Description

ZenML Server in the ZenML package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.

References

Published by the National Vulnerability Database Feb 27, 2024
Published to the GitHub Advisory Database Feb 27, 2024
Reviewed Feb 27, 2024
Last updated Aug 2, 2024

Severity

Moderate

EPSS score

0.749%
(82nd percentile)

Weaknesses

CVE ID

CVE-2024-25723

GHSA ID

GHSA-vf7j-cmrj-pmmm

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.