Логотип exploitDog
bind:CVE-2024-2083
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-2083

Количество 2

Количество 2

nvd логотип

CVE-2024-2083

почти 2 года назад

A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-6h3f-43vq-53hj

почти 2 года назад

Directory traversal in zenml

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-2083

A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically within the /api/v1/steps endpoint. Attackers can exploit this vulnerability by manipulating the 'logs' URI path in the request to fetch arbitrary file content, bypassing intended access restrictions. The vulnerability arises due to the lack of validation for directory traversal patterns, allowing attackers to access files outside of the restricted directory.

CVSS3: 9.9
1%
Низкий
почти 2 года назад
github логотип
GHSA-6h3f-43vq-53hj

Directory traversal in zenml

CVSS3: 9.9
1%
Низкий
почти 2 года назад

Уязвимостей на страницу