Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-36105
HistoryMay 27, 2024 - 5:17 p.m.

CVE-2024-36105 dbt allows Binding to an Unrestricted IP Address via socketsocket

2024-05-2717:17:39
CWE-1327
GitHub_M
github.com
cve-2024-36105
dbt
unrestricted ip address
socketsocket
data transformation
unauthorized access
network interfaces
python docs
http web site
dbt-core v1.6.15
dbt-core v1.7.15
dbt-core v1.8.1

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to INADDR_ANY (0.0.0.0) or IN6ADDR_ANY (::) exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: '' represents INADDR_ANY, equivalent to "0.0.0.0". On systems with IPv6, ‘’ represents IN6ADDR_ANY, which is equivalent to "::". A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in dbt docs serve.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:dbt-labs:dbt-core:*:*:*:*:*:*:*:*"
    ],
    "vendor": "dbt-labs",
    "product": "dbt-core",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.6.15",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "1.7.0",
        "lessThan": "1.7.15",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:dbt-labs:dbt-core:1.8.0:*:*:*:*:*:*:*"
    ],
    "vendor": "dbt-labs",
    "product": "dbt-core",
    "versions": [
      {
        "status": "affected",
        "version": "1.8.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-36105