Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fg5m-m723-7mv6

Опубликовано: 16 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 7.3

Описание

D-Tale Command Execution Vulnerability

D-Tale is the combination of a Flask back-end and a React front-end to bring you an easy way to view & analyze Pandas data structures. In dtale\views.py, under the route @dtale.route("/chart-data/<data_id>"), the query parameters from the request are directly passed into run_query for execution. And the run_query function calls proceed without performing any processing or sanitization of the query parameter. As a result, the query is directly used in the df.query method for data retrieval. Tthe engine used is python, which allows executing the query expression ans leading to a command execution vulnerability.

Пакеты

Наименование

dtale

pip
Затронутые версииВерсия исправления

< 3.14.1

3.14.1

EPSS

Процентиль: 84%
0.02124
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 7.3
nvd
больше 1 года назад

A vulnerability, which was classified as critical, has been found in h2oai h2o-3 3.46.0.4. This issue affects the function getConnectionSafe of the file /dtale/chart-data/1 of the component JDBC Connection Handler. The manipulation of the argument query leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 84%
0.02124
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74