Path Traversal Affecting zenml package, versions [,0.55.5)


0.0
critical

Snyk CVSS

    Attack Complexity Low
    Scope Changed
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.04% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-ZENML-6615845
  • published 16 Apr 2024
  • disclosed 16 Apr 2024
  • credit rook1337

How to fix?

Upgrade zenml to version 0.55.5 or higher.

Overview

zenml is a ZenML: Write production-ready ML code.

Affected versions of this package are vulnerable to Path Traversal due to insufficient validation of user-supplied input in the /api/v1/steps endpoint. An attacker can access files outside of the restricted directory by manipulating the 'logs' URI path in the request to fetch arbitrary file content, effectively bypassing intended access restrictions.

References