CVE-2024-32005 – nicegui
Package
Manager: pip
Name: nicegui
Vulnerable Version: >=1.4.6 <1.4.21
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00065 pctl0.20675
Details
NiceGUI allows potential access to local file system NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metadata
Created: 2024-04-12T21:23:16Z
Modified: 2024-04-15T19:41:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-mwc7-64wg-pgvj/GHSA-mwc7-64wg-pgvj.json
CWE IDs: ["CWE-22", "CWE-23"]
Alternative ID: GHSA-mwc7-64wg-pgvj
Finding: F063
Auto approve: 1