Lucene search

K
githubGitHub Advisory DatabaseGHSA-G3R5-72HF-P7P2
HistoryApr 16, 2024 - 12:30 a.m.

zenml Session Fixation vulnerability

2024-04-1600:30:33
CWE-384
GitHub Advisory Database
github.com
11
zenml-io/zenml
session fixation
jwt tokens
user authentication
logout
attacker
authentication mechanisms

4.2 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authentication mechanisms by reusing a victim’s JWT token.

Affected configurations

Vulners
Node
github_advisory_databasezenmlRange<0.56.2
CPENameOperatorVersion
zenmllt0.56.2

4.2 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for GHSA-G3R5-72HF-P7P2