Infinite loop Affecting zenml package, versions [,0.68.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-ZENML-9577183
  • published1 Apr 2025
  • disclosed20 Mar 2025
  • creditM Nadeem Qazi

Introduced: 20 Mar 2025

NewCVE-2024-9340  (opens in a new tab)
CWE-835  (opens in a new tab)

How to fix?

Upgrade zenml to version 0.68.0 or higher.

Overview

zenml is a ZenML: Write production-ready ML code.

Affected versions of this package are vulnerable to Infinite loop through the multipart request boundary processing mechanism. An attacker can cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart boundaries.

References

CVSS Base Scores

version 4.0
version 3.1