Lucene search

K
githubGitHub Advisory DatabaseGHSA-3434-HC3M-8MMM
HistoryJun 30, 2024 - 6:30 p.m.

Reflected Cross-Site Scripting (XSS) in zenml

2024-06-3018:30:37
CWE-79
GitHub Advisory Database
github.com
2
xss
zenml
version 0.57.1
vulnerability
web page generation
survey redirect
input neutralization
attacker
javascript code
user's browser session
cookies
account takeover

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

5.7 Medium

AI Score

Confidence

High

A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the ‘redirect’ parameter. Consequently, an attacker can execute arbitrary JavaScript code in the context of the user’s browser session. This vulnerability could be exploited to steal cookies, potentially leading to account takeover.

Affected configurations

Vulners
Node
zenmlMatch0.57.1
CPENameOperatorVersion
zenmleq0.57.1

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

5.7 Medium

AI Score

Confidence

High

Related for GHSA-3434-HC3M-8MMM