CVE-2024-2260: zenml Session Fixation vulnerability
(updated )
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authentication mechanisms by reusing a victim’s JWT token.
References
- github.com/advisories/GHSA-g3r5-72hf-p7p2
- github.com/pypa/advisory-database/tree/main/vulns/zenml/PYSEC-2024-254.yaml
- github.com/zenml-io/zenml
- github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945e
- huntr.com/bounties/2d0856ec-ed73-477a-8ea2-d5d4f15cf167
- nvd.nist.gov/vuln/detail/CVE-2024-2260
Code Behaviors & Features
Detect and mitigate CVE-2024-2260 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →