Description
A vulnerability in zenml-io/zenml version 0.56.3 allows attackers to reuse old session credentials or session IDs due to insufficient session expiration. Specifically, the session does not expire after a password change, enabling an attacker to maintain access to a compromised account without the victim's ability to revoke this access. This issue was observed in a self-hosted ZenML deployment via Docker, where after changing the password from one browser, the session remained active and usable in another browser without requiring re-authentication.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1999 | A vulnerability in zenml-io/zenml version 0.56.3 allows attackers to reuse old session credentials or session IDs due to insufficient session expiration. Specifically, the session does not expire after a password change, enabling an attacker to maintain access to a compromised account without the victim's ability to revoke this access. This issue was observed in a self-hosted ZenML deployment via Docker, where after changing the password from one browser, the session remained active and usable in another browser without requiring re-authentication. |
Github GHSA |
GHSA-99hm-86h7-gr3g | zenml-io/zenml does not expire the session after password reset |
References
History
No history.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T20:47:41.348Z
Reserved: 2024-05-09T08:03:08.973Z
Link: CVE-2024-4680
Updated: 2024-08-01T20:47:41.348Z
Status : Modified
Published: 2024-06-08T20:15:52.347
Modified: 2024-11-21T09:43:22.017
Link: CVE-2024-4680
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA