CVE-2024-2213

low

Description

An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. This vulnerability allows for unauthorized account takeover by bypassing the standard password change verification process. The issue was fixed in version 0.56.3.

References

https://huntr.com/bounties/8f5534ac-fd08-4b8b-8c2e-35949aa36e48

https://github.com/zenml-io/zenml/commit/58cb3d987372c91eb605853c35325701733337c2

Details

Source: Mitre, NVD

Published: 2024-06-06

Updated: 2024-10-11

Risk Information

CVSS v2

Base Score: 1.7

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 3.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Severity: Low