AVID-2026-R1632
Description
Denial of Service (DoS) via Multipart Boundary in zenml-io/zenml (CVE-2024-9340)
Details
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthenticated attackers to cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart boundaries. This flaw in the multipart request boundary processing mechanism leads to an infinite loop, resulting in a complete denial of service for all users. Affected endpoints include /api/v1/login and /api/v1/device_authorization.
Reason for inclusion in AVID: CVE-2024-9340 describes a Denial of Service vulnerability in zenml-io/zenml (a software component used in ML pipelines). It affects a dependency/tooling commonly used in AI workflows, representing a software supply chain issue within AI systems. It has clear security impact (DoS with high CVSS score). Sufficient evidence is provided in the report.
References
- NVD entry
- https://huntr.com/bounties/c9200654-7dc0-4c1d-8573-ab79a87fb4f6
- https://github.com/zenml-io/zenml/commit/cba152eb9ca3071c8372b0b91c02d9d3351de48d
Affected or Relevant Artifacts
- Developer: zenml-io
- Deployer: zenml-io
- Artifact Details:
| Type | Name |
|---|---|
| System | zenml-io/zenml |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Base Score | 7.5 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-835 | CWE-835 Loop with Unreachable Exit Condition |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-03-20
- Version: 0.3.3
- AVID Entry