Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0196 | A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the 'redirect' parameter. Consequently, an attacker can execute arbitrary JavaScript code in the context of the user's browser session. This vulnerability could be exploited to steal cookies, potentially leading to account takeover. |
Github GHSA |
GHSA-3434-hc3m-8mmm | Reflected Cross-Site Scripting (XSS) in zenml |
Tue, 20 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenml
Zenml zenml |
|
| CPEs | cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zenml
Zenml zenml |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:03:10.618Z
Reserved: 2024-05-17T12:00:48.633Z
Link: CVE-2024-5062
Updated: 2024-08-01T21:03:10.618Z
Status : Modified
Published: 2024-06-30T16:15:03.217
Modified: 2024-11-21T09:46:53.077
Link: CVE-2024-5062
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA