Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10649: CWE-306 Missing Authentication for Critical Function in wandb wandb/openui

0
Medium
VulnerabilityCVE-2024-10649cvecve-2024-10649cwe-306
Published: Mon Feb 10 2025 (02/10/2025, 18:50:27 UTC)
Source: CVE Database V5
Vendor/Project: wandb
Product: wandb/openui

Description

wandb/openui latest commit c945bb859979659add5f490a874140ad17c56a5d contains a vulnerability where unauthenticated endpoints allow file uploads and downloads from an AWS S3 bucket. This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. The affected endpoints are '/v1/share/{id:str}' for uploading and '/v1/share/{id:str}' for downloading JSON files. The lack of authentication allows any user to upload and overwrite files, potentially causing the S3 bucket to run out of space, injecting malicious scripts, and accessing sensitive information.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:15:33 UTC

Technical Analysis

CVE-2024-10649 is a vulnerability identified in the wandb/openui project, specifically in the latest commit c945bb859979659add5f490a874140ad17c56a5d. The flaw arises from missing authentication controls on critical API endpoints '/v1/share/{id:str}', which allow unauthenticated users to upload and download JSON files directly to and from an AWS S3 bucket. This lack of authentication (CWE-306) enables attackers to overwrite existing files or upload malicious content without any privilege requirements. The consequences include denial of service by filling the S3 bucket storage, stored cross-site scripting (XSS) attacks through malicious JSON payloads that may be rendered in user interfaces, and information disclosure by downloading sensitive files stored in the bucket. The vulnerability has a CVSS 3.0 base score of 6.1, indicating medium severity, with attack vector as network, low attack complexity, no privileges required, but requiring user interaction to trigger some impacts. The scope is changed (S:C) because the vulnerability affects resources beyond the vulnerable component, potentially impacting the confidentiality and integrity of data stored in the S3 bucket. No patches have been linked yet, and no known exploits are reported in the wild. The vulnerability affects all unspecified versions of wandb/openui that include this commit or similar code. Given wandb/openui’s role in machine learning experiment tracking and collaboration, this vulnerability could be exploited to disrupt workflows, leak sensitive experiment data, or inject malicious scripts into shared resources.

Potential Impact

For European organizations, the impact of CVE-2024-10649 can be significant, especially those relying on wandb/openui for collaborative machine learning projects and data sharing. Confidentiality is at risk due to unauthorized access to potentially sensitive JSON files stored in AWS S3 buckets, which may contain proprietary data or experiment results. Integrity is compromised as attackers can overwrite files, injecting malicious scripts that could lead to stored XSS attacks affecting users who access these files via web interfaces. Availability may be degraded if attackers fill the S3 bucket storage, causing denial of service conditions that disrupt normal operations. This can delay research and development activities, impacting productivity and potentially causing financial losses. Additionally, regulatory compliance risks arise under GDPR if personal or sensitive data is exposed. The lack of authentication means any external attacker can exploit this vulnerability remotely without credentials, increasing the attack surface. The requirement for user interaction to trigger some impacts (e.g., XSS) means social engineering or phishing could be used to maximize damage. Overall, this vulnerability threatens the confidentiality, integrity, and availability of critical data and services in European AI/ML environments.

Mitigation Recommendations

European organizations should immediately implement the following mitigations: 1) Restrict access to the '/v1/share/{id:str}' endpoints by enforcing strong authentication and authorization controls to ensure only trusted users can upload or download files. 2) Implement input validation and sanitization on uploaded JSON files to prevent injection of malicious scripts and reduce XSS risks. 3) Monitor AWS S3 bucket usage and set storage quotas or alerts to detect abnormal file upload volumes that could indicate denial of service attempts. 4) Use AWS S3 bucket policies to restrict public access and enforce least privilege principles. 5) If possible, disable or limit the sharing functionality until a secure patch is available. 6) Conduct regular security audits and penetration testing focused on API endpoints and cloud storage configurations. 7) Educate users about the risks of interacting with shared links and files, emphasizing caution with unexpected or suspicious content. 8) Track updates from wandb/openui for official patches and apply them promptly once released. These steps go beyond generic advice by focusing on access control, monitoring, and user awareness specific to this vulnerability’s attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-10-31T20:34:01.438Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b22178f764e1f470a2a

Added to database: 10/15/2025, 1:01:22 PM

Last enriched: 10/15/2025, 1:15:33 PM

Last updated: 11/26/2025, 3:08:14 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats