Exploit/Advisories no image

Published on April 9th, 2024 📆 | 3929 Views ⚑

0

ZenML Remote Privilege Escalation


Text to Speech

ZenML allows for remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. This is the proof of concept exploit. All ZenML versions below 0.46.7 are vulnerable, with the exception being patched versions 0.44.4, 0.43.1, and 0.42.2.

Source link





Tagged with:



Leave a Reply

Your email address will not be published.