A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
History

Mon, 12 May 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Zenml
Zenml zenml
CPEs cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
Vendors & Products Zenml
Zenml zenml
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-04-16T00:00:15.637Z

Updated: 2024-08-01T19:03:38.832Z

Reserved: 2024-03-01T14:43:51.962Z

Link: CVE-2024-2083

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:38.832Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-16T00:15:11.057

Modified: 2025-05-12T13:12:08.613

Link: CVE-2024-2083

cve-icon Redhat

No data.