Lucene search

K
githubGitHub Advisory DatabaseGHSA-MQ73-G4QR-FGCQ
HistoryJun 06, 2024 - 9:30 p.m.

Clickjacking in zenml

2024-06-0621:30:36
CWE-1021
GitHub Advisory Database
github.com
3
clickjacking
zenml
vulnerability
x-frame-options
content-security-policy
unauthorized actions
iframe

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

4.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5 due to the application’s failure to set appropriate X-Frame-Options or Content-Security-Policy HTTP headers. This vulnerability allows an attacker to embed the application UI within an iframe on a malicious page, potentially leading to unauthorized actions by tricking users into interacting with the interface under the attacker’s control. The issue was addressed in version 0.56.3.

Affected configurations

Vulners
Node
zenmlRange<0.56.3
CPENameOperatorVersion
zenmllt0.56.3

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

4.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-MQ73-G4QR-FGCQ