dtale@3.13.0 vulnerabilities

Web Client for Visualizing Pandas Objects

Direct Vulnerabilities

Known vulnerabilities in the dtale package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Remote Code Execution (RCE)

[,3.14.1)
  • M
Remote Code Execution (RCE)

dtale is a Web Client for Visualizing Pandas Objects

Affected versions of this package are vulnerable to Remote Code Execution (RCE) via the run_query function due to improper sanitization of the query parameter. An attacker can execute arbitrary code on the server by sending malicious input.

Note:

This is only exploitable if "Custom Filter" input is turned on, which is the default option.

CVE-2024-8862 is a duplicate of this vulnerability.

How to fix Remote Code Execution (RCE)?

Upgrade dtale to version 3.14.1 or higher.

[,3.14.1)
  • H
Improper Input Validation

dtale is a Web Client for Visualizing Pandas Objects

Affected versions of this package are vulnerable to Improper Input Validation due to the use of a hardcoded SECRET_KEY in the flask configuration and improper restriction of custom filter queries. An attacker can forge a session cookie and execute arbitrary code on the server by bypassing the authentication mechanisms and exploiting the /update-settings endpoint, even when enable_custom_filters is not enabled.

Note:

This vulnerability can be exploited only if authentication is enabled.

How to fix Improper Input Validation?

Upgrade dtale to version 3.13.1 or higher.

[,3.13.1)