CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS
Percentile
13.0%
dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to INADDR_ANY (0.0.0.0)
or IN6ADDR_ANY (::)
exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: ''
represents INADDR_ANY
, equivalent to "0.0.0.0"
. On systems with IPv6, ‘’ represents IN6ADDR_ANY
, which is equivalent to "::"
. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in dbt docs serve
.
cwe.mitre.org/data/definitions/1327.html
docs.python.org/3/library/socket.html#socket-families
docs.securesauce.dev/rules/PY030
github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39
github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7
github.com/dbt-labs/dbt-core/issues/10209
github.com/dbt-labs/dbt-core/pull/10208
github.com/dbt-labs/dbt-core/releases/tag/v1.6.15
github.com/dbt-labs/dbt-core/releases/tag/v1.7.15
github.com/dbt-labs/dbt-core/releases/tag/v1.8.1
github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349