PyPi: Zenml

CVE-2024-4311

Safety vulnerability ID: 74260

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 14, 2024 Updated at Nov 22, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of zenml-io/zenml before are vulnerable to Open Redirection (CWE-601). This vulnerability allows attackers to redirect users to malicious sites by manipulating the next parameter in the login functionality. The impact includes phishing attacks and unauthorized access to sensitive resources. The attack vector involves crafting requests with malicious next parameters to the /api/v1/current-user endpoint. Vulnerable functions include login in app_blueprint.py and get_redirect_url in helpers.py. To mitigate, upgrade to zenml-io/zenml the version which implements proper validation and handling of redirect URLs, preventing unauthorized redirections.

Affected package

zenml

Latest version: 0.70.0

ZenML: Write production-ready ML code.

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application