Security
Headlines
HeadlinesLatestCVEs

Headline

ZenML Remote Privilege Escalation

ZenML allows for remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. This is the proof of concept exploit. All ZenML versions below 0.46.7 are vulnerable, with the exception being patched versions 0.44.4, 0.43.1, and 0.42.2.

Packet Storm

© 2022 Packet Storm. All rights reserved.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution