Missing ratelimit on passwrod resets in zenml
Moderate severity
GitHub Reviewed
Published
Nov 14, 2024
to the GitHub Advisory Database
•
Updated Nov 18, 2024
Description
Published by the National Vulnerability Database
Nov 14, 2024
Published to the GitHub Advisory Database
Nov 14, 2024
Reviewed
Nov 14, 2024
Last updated
Nov 18, 2024
zenml-io/zenml version 0.56.4 is vulnerable to an account takeover due to the lack of rate-limiting in the password change function. An attacker can brute-force the current password in the 'Update Password' function, allowing them to take over the user's account. This vulnerability is due to the absence of rate-limiting on the '/api/v1/current-user' endpoint, which does not restrict the number of attempts an attacker can make to guess the current password. Successful exploitation results in the attacker being able to change the password and take control of the account.
References