# N/A
## 漏洞概述
ZenML Server在Python的ZenML机器学习包中存在远程权限提升漏洞。该漏洞是由于API端点`/api/v1/users/{user_name_or_id}/activate`在请求体中使用有效的用户名和新的密码进行访问控制时导致的。
## 影响版本
- 0.46.7之前的版本
- 补丁版本:0.44.4,0.43.1,0.42.2
## 漏洞细节
该问题在于`/api/v1/users/{user_name_or_id}/activate` REST API端点。该端点允许远程攻击者通过提供有效的用户名和一个新密码来进行访问,从而实现权限提升。
## 影响
此漏洞允许远程攻击者通过上述API端点进行权限提升操作,可能导致未经授权的访问和数据泄露。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/david-botelho-mariano/exploit-CVE-2024-25723 | POC详情 |
| 2 | ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. | https://github.com/projectdiscovery/nuclei-templates/blob/main/passive/cves/2024/CVE-2024-25723.yaml | POC详情 |
| 3 | ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-25723.yaml | POC详情 |
暂无评论