Lucene search

K
cve[email protected]CVE-2023-46134
HistoryOct 25, 2023 - 9:15 p.m.

CVE-2023-46134

2023-10-2521:15:10
CWE-79
web.nvd.nist.gov
34
cve-2023-46134
d-tale
remote code execution
vulnerability
patch
security
flask
react
pandas

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.4%

D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off “Custom Filter” input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.

Affected configurations

Vulners
NVD
Node
man-groupdtaleRange<3.7.0
CPENameOperatorVersion
man:d-taleman d-talelt3.7.0

CNA Affected

[
  {
    "vendor": "man-group",
    "product": "dtale",
    "versions": [
      {
        "version": "< 3.7.0",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.4%

Related for CVE-2023-46134