Safety vulnerability ID: 70706
The information on this page was manually curated by our Cybersecurity Intelligence Team.
NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2024-32005.
Latest version: 2.8.0
Create web-based user interfaces with Python. The nice way.
NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability. See CVE-2024-32005.
MISC:https://github.com/zauberzeug/nicegui/commit/ed12eb14f2a6c48b388a05c04b3c5a107ea9d330: https://github.com/zauberzeug/nicegui/commit/ed12eb14f2a6c48b388a05c04b3c5a107ea9d330
MISC:https://github.com/zauberzeug/nicegui/security/advisories/GHSA-mwc7-64wg-pgvj: https://github.com/zauberzeug/nicegui/security/advisories/GHSA-mwc7-64wg-pgvj
MISC:https://huntr.com/bounties/29ec621a-bd69-4225-ab0f-5bb8a1d10c67: https://huntr.com/bounties/29ec621a-bd69-4225-ab0f-5bb8a1d10c67
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application