Lucene search

K
githubGitHub Advisory DatabaseGHSA-7HFX-H3J3-RWQ4
HistoryJan 05, 2024 - 9:21 p.m.

D-Tale server-side request forgery through Web uploads

2024-01-0521:21:40
CWE-918
GitHub Advisory Database
github.com
5
d-tale
ssrf
vulnerability
upgrade
3.9.0
server-side request forgery
web uploads

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.3%

Impact

Users hosting D-Tale publicly can be vulnerable to server-side request forgery (SSRF) allowing attackers to access files on the server.

Patches

Users should upgrade to version 3.9.0 where the “Load From the Web” input is turned off by default. You can find out more information on how to turn it back on here

Workarounds

The only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.

References

See “Load Data & Sample Datasets” documentation

Affected configurations

Vulners
Node
dtaleRange<3.9.0
CPENameOperatorVersion
dtalelt3.9.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.3%

Related for GHSA-7HFX-H3J3-RWQ4