CVE-2023-46134 – dtale
Package
Manager: pip
Name: dtale
Vulnerable Version: >=0 <3.7.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01636 pctl0.8128
Details
dtale vulnerable to Remote Code Execution through the Custom Filter Input ### Impact Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. ### Patches Users should upgrade to version 3.7.0 where the "Custom Filter" input is turned off by default. You can find out more information on how to turn it back on [here](https://github.com/man-group/dtale#custom-filter) ### Workarounds The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users. ### References See "Custom Filter" [documentation](https://github.com/man-group/dtale#custom-filter)
Metadata
Created: 2023-10-25T14:20:48Z
Modified: 2023-10-31T21:23:50Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-jq6c-r9xf-qxjm/GHSA-jq6c-r9xf-qxjm.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-jq6c-r9xf-qxjm
Finding: F425
Auto approve: 1