Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-25723 PoC — ZenML 安全漏洞

Source
Associated Vulnerability
Title:ZenML 安全漏洞 (CVE-2024-25723)
Description:ZenML是一个可扩展的开源 MLOps 框架,用于创建可移植的、可用于生产的机器学习管道。 ZenML 0.46.7之前版本存在安全漏洞,该漏洞源于/api/v1/users/{user_name_or_id}/activate REST API端点允许根据有效用户名和新密码进行访问。攻击者利用该漏洞可以升级权限。
Description
ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body.
File Snapshot

id: CVE-2024-25723 info: name: ZenML ZenML Server - Improper Authentication author: David Botel ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.