Vulnerability Description
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authentication mechanisms by reusing a victim's JWT token.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zenml | Zenml | < 0.56.2 |
Related Weaknesses (CWE)
References
- https://github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945Patch
- https://huntr.com/bounties/2d0856ec-ed73-477a-8ea2-d5d4f15cf167ExploitThird Party Advisory
- https://github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945Patch
- https://huntr.com/bounties/2d0856ec-ed73-477a-8ea2-d5d4f15cf167ExploitThird Party Advisory
FAQ
What is CVE-2024-2260?
CVE-2024-2260 is a vulnerability with a CVSS score of 4.2 (MEDIUM). A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authent...
How severe is CVE-2024-2260?
CVE-2024-2260 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2260?
Check the references section above for vendor advisories and patch information. Affected products include: Zenml Zenml.