logo

CVE-2024-21642 dtale

Package

Manager: pip
Name: dtale
Vulnerable Version: >=0 <3.9.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00311 pctl0.53801

Details

D-Tale server-side request forgery through Web uploads ### Impact Users hosting D-Tale publicly can be vulnerable to server-side request forgery (SSRF) allowing attackers to access files on the server. ### Patches Users should upgrade to version 3.9.0 where the "Load From the Web" input is turned off by default. You can find out more information on how to turn it back on [here](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets) ### Workarounds The only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users. ### References See "Load Data & Sample Datasets" [documentation](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)

Metadata

Created: 2024-01-05T21:21:40Z
Modified: 2024-01-08T14:58:50Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-7hfx-h3j3-rwq4/GHSA-7hfx-h3j3-rwq4.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-7hfx-h3j3-rwq4
Finding: F100
Auto approve: 1