Description
D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2766 | D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users. |
Github GHSA |
GHSA-jq6c-r9xf-qxjm | dtale vulnerable to Remote Code Execution through the Custom Filter Input |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-10T14:06:54.153Z
Reserved: 2023-10-16T17:51:35.574Z
Link: CVE-2023-46134
Updated: 2024-08-02T20:37:39.665Z
Status : Modified
Published: 2023-10-25T21:15:10.167
Modified: 2024-11-21T08:27:57.147
Link: CVE-2023-46134
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA