CVE-2024-2083

A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*

History

12 May 2025, 13:12

Type Values Removed Values Added
First Time Zenml zenml
Zenml
CPE cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
References () https://github.com/zenml-io/zenml/commit/00e934f33a243a554f5f65b80eefd5ea5117367b - () https://github.com/zenml-io/zenml/commit/00e934f33a243a554f5f65b80eefd5ea5117367b - Third Party Advisory, Patch
References () https://huntr.com/bounties/f24b2216-6a4b-42a1-becb-9b47e6cf117f - () https://huntr.com/bounties/f24b2216-6a4b-42a1-becb-9b47e6cf117f - Exploit, Issue Tracking, Third Party Advisory

21 Nov 2024, 09:09

Type Values Removed Values Added
References () https://github.com/zenml-io/zenml/commit/00e934f33a243a554f5f65b80eefd5ea5117367b - () https://github.com/zenml-io/zenml/commit/00e934f33a243a554f5f65b80eefd5ea5117367b -
References () https://huntr.com/bounties/f24b2216-6a4b-42a1-becb-9b47e6cf117f - () https://huntr.com/bounties/f24b2216-6a4b-42a1-becb-9b47e6cf117f -

16 Apr 2024, 13:24

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 00:15

Updated : 2025-05-12 13:12


NVD link : CVE-2024-2083

Mitre link : CVE-2024-2083

CVE.ORG link : CVE-2024-2083


JSON object : View

Products Affected

zenml

  • zenml
CWE
CWE-29

Path Traversal: '\..\filename'