PyPi: Dtale

CVE-2024-45595

Safety vulnerability ID: 73185

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Sep 10, 2024 Updated at Dec 03, 2024
Scan your Python projects for vulnerabilities →

Advisory

D-Tale affected versions potentially exposed a security vulnerability by processing user-supplied queries without restrictions. This could allow malicious actors to craft queries leading to unauthorized data access or manipulation. The patch introduces a feature flag, "enable_custom_filters", which, when disabled, prevents processing of custom queries, significantly reducing the attack surface. Users are advised to update to the latest version and carefully manage this new flag, enabling custom filters only when necessary. Organizations should review any existing deployments, ensure proper configuration of the feature flag, and consider disabling custom filters in sensitive environments.

Affected package

dtale

Latest version: 3.16.0

Web Client for Visualizing Pandas Objects

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.8

CVSS v3 Details

CRITICAL 9.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH