5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.001 Low
EPSS
Percentile
20.5%
This bug affects Datasette instances running a Datasette 1.0 alpha - 1.0a0, 1.0a1, 1.0a2 or 1.0a3 - in an online accessible location but with authentication enabled using a plugin such as datasette-auth-passwords.
The /-/api
API explorer endpoint could reveal the names of both databases and tables - but not their contents - to an unauthenticated user.
Datasette 1.0a4 has a fix for this issue.
To work around this issue, block all traffic to the /-/api
endpoint. This can be done with a proxy such as Apache or NGINX, or by installing the datasette-block plugin and adding the following configuration to your metadata.json
or metadata.yml
file:
{
"plugins": {
"datasette-block": {
"prefixes": ["/-/api"]
}
}
}
This will block access to the API explorer but will still allow access to the Datasette read or write JSON APIs, as those use different URL patterns within the Datasette /database
hierarchy.
github.com/advisories/GHSA-7ch3-7pp7-7cpq
github.com/pypa/advisory-database/tree/main/vulns/datasette/PYSEC-2023-154.yaml
github.com/simonw/datasette/commit/01e0558825b8f7ec17d3b691aa072daf122fcc74
github.com/simonw/datasette/security/advisories/GHSA-7ch3-7pp7-7cpq
nvd.nist.gov/vuln/detail/CVE-2023-40570