D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2766 | D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users. |
Github GHSA |
GHSA-jq6c-r9xf-qxjm | dtale vulnerable to Remote Code Execution through the Custom Filter Input |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-10T14:06:54.153Z
Reserved: 2023-10-16T17:51:35.574Z
Link: CVE-2023-46134
Updated: 2024-08-02T20:37:39.665Z
Status : Modified
Published: 2023-10-25T21:15:10.167
Modified: 2024-11-21T08:27:57.147
Link: CVE-2023-46134
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA