THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-2035

Improper Authorization in zenml-io/zenml

Assigner@huntr_ai
Reserved2024-02-29
Published2024-06-06
Updated2024-07-26

Description

An improper authorization vulnerability exists in the zenml-io/zenml repository, specifically within the API PUT /api/v1/users/id endpoint. This vulnerability allows any authenticated user to modify the information of other users, including changing the `active` status of user accounts to false, effectively deactivating them. This issue affects version 0.55.3 and was fixed in version 0.56.2. The impact of this vulnerability is significant as it allows for the deactivation of admin accounts, potentially disrupting the functionality and security of the application.



MEDIUM: 6.5CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-1220 Insufficient Granularity of Access Control

Product status

Any version before 0.56.2
affected

References

https://huntr.com/bounties/1cfc6493-082e-4229-9f2f-496801a6557c

https://github.com/zenml-io/zenml/commit/b95f083efffa56831cd41d8ed536aeb0b6038fa3

cve.org CVE-2024-2035

nvd.nist.gov CVE-2024-2035

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-2035
© Copyright 2024 THREATINT. Made in Cyprus with +