mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
64 lines
2.5 KiB
JSON
64 lines
2.5 KiB
JSON
{
|
|
"id": "CVE-2024-9340",
|
|
"sourceIdentifier": "security@huntr.dev",
|
|
"published": "2025-03-20T10:15:48.100",
|
|
"lastModified": "2025-03-20T10:15:48.100",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthenticated attackers to cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart boundaries. This flaw in the multipart request boundary processing mechanism leads to an infinite loop, resulting in a complete denial of service for all users. Affected endpoints include `/api/v1/login` and `/api/v1/device_authorization`."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en zenml-io/zenml versi\u00f3n 0.66.0 permite a atacantes no autenticados consumir recursos excesivamente mediante el env\u00edo de solicitudes multiparte malformadas con caracteres arbitrarios a\u00f1adidos al final de los l\u00edmites. Esta falla en el mecanismo de procesamiento de los l\u00edmites de solicitudes multiparte genera un bucle infinito, lo que resulta en una denegaci\u00f3n de servicio completa para todos los usuarios. Los endpoints afectados incluyen `/api/v1/login` y `/api/v1/device_authorization`."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@huntr.dev",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/zenml-io/zenml/commit/cba152eb9ca3071c8372b0b91c02d9d3351de48d",
|
|
"source": "security@huntr.dev"
|
|
},
|
|
{
|
|
"url": "https://huntr.com/bounties/c9200654-7dc0-4c1d-8573-ab79a87fb4f6",
|
|
"source": "security@huntr.dev"
|
|
}
|
|
]
|
|
} |