Логотип exploitDog
bind:CVE-2024-4311
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4311

Количество 2

Количество 2

nvd логотип

CVE-2024-4311

около 1 года назад

zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-j3vq-pmp5-r5xj

около 1 года назад

Missing ratelimit on passwrod resets in zenml

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4311

zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.

CVSS3: 5.4
0%
Низкий
около 1 года назад
github логотип
GHSA-j3vq-pmp5-r5xj

Missing ratelimit on passwrod resets in zenml

CVSS3: 5.4
0%
Низкий
около 1 года назад

Уязвимостей на страницу