Home » Database

AVID-2026-R1525

Description

Lack of login attempt rate-limiting in zenml-io/zenml (CVE-2024-4311)

Details

zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the ‘Update Password’ function, allowing them to take over the user’s account. This vulnerability is due to the absence of rate-limiting on the ‘/api/v1/current-user’ endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.

Reason for inclusion in AVID: CVE-2024-4311 concerns a software vulnerability in the ZenML ML pipeline framework (an AI tooling/library). It enables account takeover through brute-forcing the login/password-change flow due to missing rate-limiting, a security issue that affects software components used to build/deploy ML/AI pipelines. This maps to a software supply chain vulnerability in AI systems, particularly in dependencies/tooling, and has clear CVSS evidence. Therefore it should be kept for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: zenml-io
  • Deployer: zenml-io
  • Artifact Details:
TypeName
Systemzenml-io/zenml

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H
Base Score5.4
Base Severity🟠 Medium
Attack VectorNETWORK
Attack Complexity🔴 High
Privileges Required🟢 Low
User InteractionREQUIRED
ScopeUNCHANGED
Confidentiality Impact🟢 Low
Integrity ImpactNONE
Availability Impact🔴 High

CWE

IDDescription
CWE-770CWE-770 Allocation of Resources Without Limits or Throttling

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-11-14
  • Version: 0.3.3
  • AVID Entry