Safety vulnerability ID: 62043
The information on this page was manually curated by our Cybersecurity Intelligence Team.
D-Tale 3.7.0 includes a fix for CVE-2023-46134: Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.
https://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm
Latest version: 3.16.0
Web Client for Visualizing Pandas Objects
D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users. See CVE-2023-46134.
MISC:https://github.com/man-group/dtale/commit/bf8c54ab2490803f45f0652a9a0e221a94d39668: https://github.com/man-group/dtale/commit/bf8c54ab2490803f45f0652a9a0e221a94d39668
MISC:https://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm: https://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application