THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-2171

Stored XSS in zenml-io/zenml

Assigner@huntr_ai
Reserved2024-03-04
Published2024-06-06
Updated2024-06-06

Description

A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml repository, specifically within the 'logo_url' field. By injecting malicious payloads into this field, an attacker could send harmful messages to other users, potentially compromising their accounts. The vulnerability affects version 0.55.3 and was fixed in version 0.56.2. The impact of exploiting this vulnerability could lead to user account compromise.



LOW: 3.4CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Any version before 0.56.2
affected

References

https://huntr.com/bounties/cee06a28-7e3b-460b-b504-69add838ebe8

https://github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945e

cve.org CVE-2024-2171

nvd.nist.gov CVE-2024-2171

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-2171
© Copyright 2024 THREATINT. Made in Cyprus with +