CVE-2024-45595 – dtale
Package
Manager: pip
Name: dtale
Vulnerable Version: >=0 <3.14.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00095 pctl0.27451
Details
D-Tale vulnerable to Remote Code Execution through the Query input on Chart Builder ### Impact Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. ### Patches Users should upgrade to version 3.14.1 where the "Custom Filter" input is turned off by default. You can find out more information on how to turn it back on [here](https://github.com/man-group/dtale#custom-filter) ### Workarounds The only workaround for versions earlier than 3.14.1 is to only host D-Tale to trusted users. ### References See "Custom Filter" [documentation](https://github.com/man-group/dtale#custom-filter)
Metadata
Created: 2024-09-10T19:42:56Z
Modified: 2024-09-10T19:42:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-pw44-4h99-wqff/GHSA-pw44-4h99-wqff.json
CWE IDs: ["CWE-74", "CWE-79"]
Alternative ID: GHSA-pw44-4h99-wqff
Finding: F425
Auto approve: 1