Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gjxm-x497-4h6h | Duplicate Advisory: D-Tale Command Injection vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No reference.
Tue, 15 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in man-group/dtale versions 3.15.1 allows an attacker to override global state settings to enable the `enable_custom_filters` feature, which is typically restricted to trusted environments. Once enabled, the attacker can exploit the /test-filter endpoint to execute arbitrary system commands, leading to remote code execution (RCE). This issue is addressed in version 3.16.1. | ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-55890. Notes: All CVE users should reference CVE-2024-55890 instead of this CVE Record. All references and descriptions in this candidate have been removed to prevent accidental usage. |
| Title | Remote Code Execution via Global State Override in man-group/dtale | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_0
|
Tue, 15 Apr 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Man
Man d-tale |
|
| Metrics |
cvssV3_1
|
Fri, 04 Apr 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 |
Tue, 01 Apr 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Man
Man d-tale |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:man:d-tale:3.15.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Man
Man d-tale |
|
| Metrics |
cvssV3_1
|
Thu, 20 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in man-group/dtale versions 3.15.1 allows an attacker to override global state settings to enable the `enable_custom_filters` feature, which is typically restricted to trusted environments. Once enabled, the attacker can exploit the /test-filter endpoint to execute arbitrary system commands, leading to remote code execution (RCE). This issue is addressed in version 3.16.1. | |
| Title | Remote Code Execution via Global State Override in man-group/dtale | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: REJECTED
Assigner: @huntr_ai
Published:
Updated: 2025-04-15T15:57:29.661Z
Reserved: 2025-01-22T18:15:59.356Z
Link: CVE-2025-0655
Updated:
Status : Rejected
Published: 2025-03-20T10:15:53.533
Modified: 2025-04-15T16:15:56.733
Link: CVE-2025-0655
No data.
OpenCVE Enrichment
No data.
No weakness.
Github GHSA