低危 zenml-io/zenml 中的竞争条件漏洞 (CVE-2024-2032)

CVE编号

CVE-2024-2032

利用情况

暂无

补丁情况

官方补丁

披露时间

2024-06-07
漏洞描述
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55.3, which allows for the creation of multiple users with the same username when requests are sent in parallel. This issue was fixed in version 0.55.5. The vulnerability arises due to insufficient handling of concurrent user creation requests, leading to data inconsistencies and potential authentication problems. Specifically, concurrent processes may overwrite or corrupt user data, complicating user identification and posing security risks. This issue is particularly concerning for APIs that rely on usernames as input parameters, such as PUT /api/v1/users/test_race, where it could lead to further complications.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 zenml zenml * Up to
(excluding)
0.55.5
运行在以下环境
系统 fedora_38 clamd * Up to
(excluding)
1.0.5-1.fc38
运行在以下环境
系统 fedora_39 clamd * Up to
(excluding)
1.0.5-1.fc39
运行在以下环境
系统 fedora_EPEL_9 clamd * Up to
(excluding)
1.0.5-1.el9
阿里云评分
3.1
  • 攻击路径
    本地
  • 攻击复杂度
    困难
  • 权限要求
    管控权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-362 使用共享资源的并发执行不恰当同步问题(竞争条件)
CWE-366 单线程内的竞争条件
阿里云安全产品覆盖情况